Kinds of Cyber Attacks

On a time when the world is getting locked down due to COVID19 which is a deadly virus and very contagious thanks to the Wuhan city located in Central China. This is also one of the kinds of attack which the world is battling with and is referred to as a World War – III. We hope that this pandemic comes to an end as early as possible and our world around doctors or scientists find its antidote . To get the latest counts on COVID19 check out the link

We took COVID19 as an example above as its also a kind of attack which the world is facing today so let’s check some of the basic CyberAttacks which are happening around us but we as a person are not aware of it, so let’s understand about it :

Catfishing: Process of creating a online profile in order to trick people into believing they are someone else for financial gains.

Zeroday Attack: It is a threat that is unknown to security specialist and has not been addressed.

Social Engineering: Asking the information over the meeting or talking to him or her to gain the sensitive information of any secured data.

Foot Printing: The process where a hacker takes passive steps to gather information about a potential target.

Phishing : The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers.

Reconnaissance: A type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.

Vishing: The fraudulent practice of making phone calls or leaving voice messages purporting to be from a reputable companies in order to induce individuals to reveal personal information such as bank details or CC details etc.

Doxing: The attacker threatens to release sensitive information or an access to other unless victim says him .

Shoulder Surfing: It is a type of social engineering technique used to obtain information such as personal identification numbers, passwords and other confidential data .

Spoofing: Spoofing attack is a situation in which a person or program successfully masquerade as another by falsifying data to gain an illegitimate.

Pharming: It is a form of an online fraud that redirects users from legitimate. website’s traffic to another fake site.

Smishing: The use of text messages sent to a target in order to lure them to click on the links contained in the text.

Spear-Phishing: The fraudulent practice of sending emails from known or trusted sender in order to induce targeted individuals to reveal confidential information.

Whaling: The method used by the cybercriminals to target senior or other important individuals of an organization.

Dumpster Diving: It is an attack where the goal of an attacker is to reclaim important information by inspecting the contents of trash containers and dumpsters.

Watering Hole Attacks: it is a security exploit in which the attacker seeks to compromise a specific group of an end users by infecting websites that members of the group are known to visit such as social networking sites.

DoS (Denial-of-Service): An attack which is meant to shut down a machine or network, making it inaccessible to its intended users.

Brute Force Attack: It is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.

Dictionary Attack: It is a form of attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption or passphrase by trying hundreds or sometimes millions of likely possibilities such as words in a dictionary.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Website Built with

Up ↑

Create your website with
Get started
%d bloggers like this: