The media is increasingly making the risks of suffering a computer attack more evident. Phishing, Ransomware, Malware, etc. are just some of the many attacks that occur daily, but do we know how to face this challenge? Fortunately, we have tools that help us and protect us, and these are encompassed by cybersecurity.
Computer security or information technology security is what cybersecurity is commonly known as.
What is cybersecurity?
Well, the practice of defending our computers, servers, networks, our data, mobile devices, among others, is what we call cybersecurity and its scope of application is general, from the business world to the personal world.
You can expand your concepts on what cybersecurity is in the following article: What is cybersecurity and why is it important?
There are currently many types of cyber attacks and cybercrime is growing landline number list exponentially, so we have to be prepared for cybercrime, cyberattacks and cyberterrorism.
Viruses, Trojans, Spyware, Ransomware, Adware and Botnets are the different types of malware or malicious software that a cybercriminal uses to take control of a device.
Other very common types of attacks include SQL code injection, Phishing, Man-in-the-middle or a denial of service attack.
mobile cybersecurity
If this post is your first contact with this wonderful world of cybersecurity, after reading these first lines, it is possible that everything sounds like Chinese to you. Let's see it better with examples.
Let's assume that you are a very hard-working person, a real ant, who after a while has managed to accumulate some small savings. You deposit a small amount into your savings account every month, in order to spend it after a while.
Cybercriminals, never to be confused with hackers, do not respect and much less distinguish between people with a high purchasing power and people who have a hard time saving.
One day you open your inbox and find an email supposedly from your bank. Nothing suggests that it is malicious because it looks identical to that of your bank, they use the corporate image of the entity and they know your data. However, they will ask you to perform an action, such as: "click on the following link to find out the status of your request."
With the rush that characterizes our current society and the immediacy of things, we innocently click. You have just been the victim of a cybercriminal! He has used a technique known as Phishing, which is a type of fraud that impersonates the identity, in this case of a banking entity.
We will see in more detail in the following posts how cybercriminals obtain your data and information to launch a phishing attack and what measures we can take to protect ourselves.