5 Types Of Cyber Attacks to be aware of in 2022

The world is advancing a lot with many digital devices and the internet to complement the advancement. It's really beautiful to see how far the world

The world is advancing a lot with many digital devices and the internet to complement the advancement. It's really beautiful to see how far the world has come technically, from digital devices like computers being available to selected people to almost everyone having access to one. But there's always a downside to every good thing and as such, there are lots of downsides to the digital devices and the internet that we use daily.

In this month's newsletter, we will discuss the types of cyber attacks and how to prevent yourself from them.

What is Cyber attack? Before jumping to the types, it's essential to ensure we all understand what Cyber attack itself means.

is an unauthorized system/network access by a third party. An individual who carries out a cyber attack is called a Hacker or Attacker.

There are many negative impacts resulting from a Cyber attack, which include;
(i) Data Breach, resulting in data loss or data manipulation.
(ii) Organizations suffer financial losses and many more.

While companies can afford a dedicated cybersecurity team, individuals are vested with the responsibilities of protecting themselves online and this is why we give tips monthly to help ensure you stay safe online.

Types Of Cyber Attacks
There are many types of cyber attacks but we are trying to get you familiar with the 5 most common attacks.

1. Phishing Attack
Phishing attack is one of the most commonly used method of attack by hackers. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords

2. Malware Attack:
A malware attack is a common cyberattack where malware (normally malicious software virus like worm, adware, spyware, trojan, and ransomware) executes unauthorized actions on the victim's system.

A trojan virus pretends to be legitimate software. Ransomware blocks access to the network's key components, whereas Spyware is software that steals all your confidential data without your knowledge. Adware is software that displays advertising content such as banners on a user's screen.

Preventing a Malware Attack?
Make use of a Firewall as it helps filter the traffic that gets access to your devices. Windows and Mac have built-in firewalls.
(ii) Install Antivirus on your devices.
(iii) Regularly update your devices.
(iv) Be cautious and avoid malicious links.

3. Password Attack:
It's a type of attack, where a hacker cracks your password using various programs and password cracking tools like Cain, Abel, John the ripper, Aircrack, and many more.

There are also many types of password attacks which includes; Brute force, keylogger, and dictionary attack.

Preventing a Password Attack?

(i) Cultivate the habit of choosing a strong password(at least 8 characters) with special characters.
(ii) Use password vault apps like Lastpass to safeguard all your passwords in one place.
(iii) Avoid using one password for many websites.
(iv) Change your password regularly.

4. Man-in-the-Middle Attack:
it's a type of eavesdropping attack, where a hacker interrupts an ongoing conversation or data transfer. After inserting themselves in the "middle" of the transfer, the hacker pretends to be both legitimate participants. This enables the hacker to intercept information and data from either party while also sending malicious links or other information to both participants in a way that might not be detected until it is too late.

Preventing a MITM Attack?
(i) Refrain from using Public Wi-Fi
(ii) Always check the security of the website you use, and ensure to use encryption on your devices.

5. SQL Injection Attack:
SQL injection is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query. A SQL injection (SQLi) manipulates SQL code to provide access to protected resources, such as sensitive data, or execute malicious SQL statements.

Preventing SQL Injection Attack?
(i) Validate User Inputs
(ii) Use an Intrusion detection system, as it's designed to detect unauthorized access to a network.

The best we can do is to help you be in the know about things like this to protect yourself online, and we will keep doing just that to ensure you don’t fall victim to cyber attackers.

Do your bit by spreading this information too.

Missed our last Techverzuz event? Watch the highlight on our youtube page and please remember to subscribe to our channel.

Certification Courses

SEC+ (1 Month Class) - Every first Sunday of the month

CEH – (1 month Class) - Every first Sunday of the month

CISSP – (2 month Class) - Every first Sunday of the month

AZ-500 – (1 month Class) - Every first Sunday of the month

For a Schedule, visit PJCourses.com or email

Categories: : Blog, Cyber basics, cybersecurity