top of page
Search

Cyberattacks in Everyday Life - Part 2


ree

In our first article on Cyber ​​Attacks in Everyday Life, we pointed out three of the most common ones that companies and even us in our social daily lives are subject to dealing with. However, these malicious practices go beyond "Phishing, Ransomware, and DDoS," and all knowledge is valuable so that we can prevent these attacks in our personal and professional lives.


In this second volume on Cyber Attacks, we will address other means of these criminal practices.


SQL Injection Attack


The technique involves the malicious insertion of SQL code into input fields of an application, such as a login form or search. Since most websites and web applications rely on SQL databases, this attack can be devastating. Without proper protection, the attacker can access, modify, or delete information from the underlying database, causing damages like exposing users' confidential information or even compromising the entire system.


Preventing this attack involves using parameterized query measures that are handled separately from the main SQL command, validating and filtering user input, and ensuring that your database software is always up to date, fixing any known vulnerabilities.


Spoofing


This is when a criminal impersonates another person or company to deceive the victim into gaining access to confidential information, invading systems, or spreading malware. There are various means of this attack, such as "Spoofing Id," where the hacker uses a site with a legitimate IP address so that the victim cannot identify the attack. Or "Email Spoofing," which is more common today, where fake emails are sent pretending to be someone else or a company, usually linked to Phishing attacks.


Measures like two-step verification, network monitoring tools, digital signatures, and user awareness are the best ways to prevent this attack.


MITM Attacks (Man-In-The-Middle)


The attacker inserts themselves into a communication between two legitimate parties, becoming an unauthorized intermediary, able to intercept, alter, and even interrupt communication without the victims noticing. This can lead to the theft of confidential information like passwords, credit card numbers, and other sensitive data.


Preventing this attack involves using VPNs, secure protocols like HTTPS that offer end-to-end encryption to protect transmitted data, and constantly verifying the SSL/TLS certificates of visited sites to ensure the connection is authentic and secure.


Conclusion


Given these threats, it is crucial to take proactive measures to protect yourself and your online information. This includes implementing robust security practices, such as regular software updates, using two-factor authentication whenever possible, and awareness of the tactics used by cybercriminals. Additionally, investing in advanced cybersecurity solutions and staying updated on the latest trends and threats in the cyber landscape is essential to stay one step ahead of intruders.

In an increasingly complex and interconnected digital world, cybersecurity has never been more important. By understanding and recognizing the different types of cyber attacks, we can strengthen our defenses and mitigate the risks associated with the digital life.



Author: Vinicius Marcondes Silva - Marketing and Communication

 

 

1 Comment


This article on cyberattacks hits close to home, as I experienced a phishing scam that compromised my social media during my final university year While I became passionate about digital security and even started a community awareness blog, the incident coincided with the most demanding phase of my cybersecurity dissertation. The research and writing became overwhelming while also managing the fallout from the attack Ultimately, I made the difficult decision to have a professional write my dissertation for me, which was the strategic choice that freed up the critical time I needed to both secure my digital life and grow my cybersecurity advocacy work, turning a personal violation into a purposeful mission

Like
bottom of page