Skip to main content

What is a CYBERATTACK?

 What is a CYBERATTACK


A cyberattack is any offensive activity that targets computer information systems, computer networks, infrastructures, personal computer devices or smartphones. In the past few months due to covid-19 cyber attacks have been increased as per the statistics. Many companies, organization's , individuals have to effected because of the cyber attacks. Many factors are involved for the happening of the attack. Some cybercriminals want money, information, others might just want to cause harm for there own pleasure. 


Effects of CYBERATTACK


Cyber attack could cause financial loss such as theft of money any private information. It can also defame any individual , damage of reputation to any business. Especially teens face cyberbullying through social media/other. Cybercrime has psychological impact on the individuals, those faces may even get into depression, trauma or suicide. It is important to educate kids/teens/youth about cybercrimes. Children and adolescents represent a vulnerable group of users who spend a lot of time on the web and on social networks. They are exposed to the same threats as adults, but the effect on them can be even more devastating.


According to Security Magazine, there are over 2,200 attacks each day which breaks down to nearly 1 cyberattack every 39 seconds. Approximately 90,000 people are affected by cyber crimes per month in the US.A: At present, the US has the highest rate of cyber crime, over 23.6% more than any other country, cyber crime statistics suggest.

Cyber crimes can involve criminal activities such as theft, fraud, forgery, defamation and mischief. 


Here are the few News articles in recent days who were the victim of cyber fraud (source : internet)


https://odishatv.in/news/technology/man-loses-rs-9-lakh-in-work-from-home-job-scam-how-to-avoid-falling-prey-to-cybercrime-199748 (source : internet)


https://www.hindustantimes.com/cities/chandigarh-news/panchkula-resident-falls-prey-to-cybercrime-loses-1-lakh-101679585043110.html (source : internet)


https://www.amarujala.com/haryana/charkhi-dadri/crime/cyber-crime-crooks-stole-1-lakh-26-thousand-from-the-account-gang-active-in-dadri-2023-03-24 (source : internet)


https://timesofindia.indiatimes.com/city/hyderabad/sbi-branch-manager-cheated-by-cybercrime-miscreants-in-telangana/articleshow/98231990.cms?from=mdr (source : internet)


https://telanganatoday.com/2249-cybercrime-cases-registered-in-hyderabad (source : internet)


https://timesofindia.indiatimes.com/city/ahmedabad/doctor-seeking-mbbs-seat-for-son-loses-rs-30-lakh/articleshow/98192910.cms (source : internet)


https://www.etvbharat.com/assamese/assam/bharat/16-dot-8-crore-personal-data-were-stolen-across-the-country/assam20230323190401244244005 (source : internet)


and many more!!!! 



Technology is one of the greatest inventions of humankind. But it depends on us how we are utilizing it. If we are using in limited manner then it is not a bane to us. 

So be careful while posting in social media, saving the information in cloud.  


Get more content on my next posts

Comments

Popular posts from this blog

WHAT IS HTTP ?? HOW HTTP WORKS?

What is HTTP? HTTP is a protocol. HTTP stands for Hypertext standard protocol . It is defined as a set of rules used for communicating with servers while transmitting any message from client to server. then, what is HTTPS? HTTPS is a secure version of HTTP. "s" is Secure in HTTPS. In HTTPS the data sent is encrypted, so that people don't see the message transmitted over the network. By using the secured version the data sent or received is completely encrypted and no one can impersonate it. When we access a website, our browser sends requests to the server and then the server gives the response in the form of web pages. webpages consist of images, audio, video, html files, and more. How do we access a website? When we access a website, the browser sends a request to a web server and downloads the responses. You need to tell the browser specifically from where to access the resources, this is where the URLs help. URL is a uniform Resource Locator which gives instructio...

What is TCP/IP Model??

What is TCP/IP Model?? TCP stands for Transmission Control protocol/Internet Protocol . It is a communication protocol used to interconnect the devices in the internet. Initially, the Transmission Control Program provided only a common service to its users, not datagram. As experience with the protocol grew, functionality was divided into layers of distinct protocols, allowing users direct access to service.  TCP provides reliable, ordered delivery of  bytes between applications running on hosts communicating via network. TCP is connection oriented means a connection is established between a client and server before data is sent. The server waits for the connection requests from clients before any connection is formed.  TCP/IP has 5 layers  Application Layer : This layer allows the user to interact with the application.  Transport Layer : This layer is responsible for flow control, the data is sent through this layer. Network Layer : This layer is responsible f...

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it . Social engineering is a term we are hearing now a days a  lot. But  what is it?  Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions. Lets see few techniques with examples below Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person. Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number. Vishing also known as " voice phishing ", is again the same practice of revealing the information over a ...