12 types of cyber attack

Cyber attacks happen all day every day in many different and sophisticated ways. In this blog we highlight the 12 most commonly used cyber attacks and hope it’ll encourage you to think about the basics of cyber security and how you’re protecting your data and computer systems.

Denial-of-service (DoS) attack

A hacker overwhelms a computer or a network with traffic to such an extent that it can’t operate and continue. This can mean a flooded inbox or server making it inaccessible to the intended user and therefore causing a system disruption.

Man-in-the-middle (MitM) attack

A hacker inserts itself between two places such as a wifi network and a victim’s machine and gains access without the victim knowing. Info can then be stolen or malicious software can be installed to carry out a malware attack.

Phishing attack

A user is tricked into thinking an email is from a reputable source, when it’s actually fraudulent communication. It can steal sensitive personal information such as credit card numbers and login details on the victim’s machine. Employee training is critical with this kind of attack,

Drive-by download attack

A hacker slips malicious code into apps, operating systems or web browsers that haven‘t been updated and therefore contain vulnerabilities. Don’t keep apps that you hardly use or update as those ones are the risky ones.

Wifi eavesdropping attack

When a user is connected to a public wifi network, hackers can intercept communication and steal usernames, passwords and other unencrypted confidential information sent while connected to the wifi network. By using a VPN you can avoid this.

Formjacking attack

A hacker loads malicious code onto an e-commerce site and steals credit card details from the checkout pages. Small to mid-sized retailers are the biggest targets though Ticketmaster and British Airways were also compromised this way.

Malware attack

A user activates malicious software (virus, spyware, ransomware) that has installed via a link attachment click, or an email attachment click. It can block access to the network, steal information by transmitting it from the hard-drive, and disrupt the working of a victim’s machine.

Password attack

A hacker tries to guess a password by repeatedly trying different passwords to gain entry. This doesn’t work when a lockout policy protects the account and it locks after three incorrect password entries.

Zero-day attack

A hacker hears about a network, app or system insecurity and exploits it before a patch or update has been issued. This is an opportunistic attack and can only be avoided if users have advanced cyber security in place.

SQL injection attack

A hacker embeds malicious code (structured query language) into a poorly designed application and is then able to gain access to resources, alter data and execute damaging commands.

Cross-site scripting (XSS) attack

A hacker injects malicious code into a trusted app or website. The code triggers when a victim visits the app or page. Most common in forums, message boards and web pages that allow comments. Can also be used to deface a website.

Brute force attack

A hacker uses trial-and-error to guess a username or password, trying repeatedly with various combinations until eventually gaining access. This is an old attack method that’s surprisingly effective and still popular with hackers.

If this has got you wondering about the safety of your systems and data, consider an advanced cyber security solution that will counter known and unknown attacks.

If you’re not sure about how well you’re protected, read this information on Cyber Security planning.

Are you aware of the different types of cyber attack?

Download this list as a PDF to arm yourself

Cyber attacks pdf

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

Does your business send bulk emails?

Learn all you need to know about Google & Yahoo’s new requirements for bulk email senders.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Hidden

Training

We also offer certified training packages The training will cover POPIA in general. We have two options available. Once off costs. Employee Awareness Training - R490 per candidate Senior Employees Awareness Training - R650 per candidate All prices exclude VAT

Company Structure

Are you part of a group structure?*
IronTree is committed to protecting and respecting your privacy, and we'll only use your personal information to administer your account and to provide the products and services you requested. From time to time, we'd like to contact you about our products and services, as well as any other content that may be of interest to you. If you consent us contacting you for this purpose please tick the checkbox below*

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

Give us a call:

+27 87 943 2278

Send us a WhatsApp:

+27 66 372 4061

Drop us an email:

After hours support:

+27 72 595 1066

After hours hosting support:

+27 76 102 9813

Log a support request

The reseller zone is currently out getting a facelift as we look to integrate it with our backup platform, as it stands you can overview your clients on our new backup console. If you don't know what console that is, please reach out to us.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

This field is for validation purposes and should be left unchanged.
One of our team members will be happy to help answer any questions you have!
Just click the chat icon in the right-hand corner.