Common Cyber Attacks and Breaches

Common Cyber Attacks and Breaches

In this tutorial you are going to learn about Common Cyber Attacks and Breaches which occurs regularly.

First of all talking about Cyber Attack, it’s an offensive action to steal or alter data using different methods in a computer system, network or organisation.


Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. The most common type of spamming is through e-mails. Advertisers have no operating cost beyond the management of their mailing lists. Generally the spam contains advertisement but some of them contains viruses, spywares, adwares, etc.

There is an another term in spamming, which is SPIM. It stands for “SPAM over instant messaging” and refers to instant unsolicited messages. To prevent these, you should have a good anti-virus in your system because today most anti-virus comes with feature of spam protection.

DDos Attack

DDos attack stands for “Distributed Denial of Service Attack” and it is a type of attack that disrupts or completely prevents users from accessing your website. A DDos attacks is achieved by flooding servers, networks and end user computers which makes your website difficult to load. These attacks send multiple requests with the aim of exceeding the website’s capacity, thereby crashing the website. In a direct DDos attack, an attacker can implant zombie softwares upto two-levels which makes more difficult to trace the attack back to its source.

Buffer Overflow

Buffer Overflow is an application error which occurs when more data is sent then its capacity. When the buffer overflows, the attacker fills the application with an executable program code which makes him administrator of the application. To protect against buffer overflow, the developers use security measures in thier code or use languages that provide built in protection.

Timing Attack

Timing attack is a type of attack in which the attacker explores the contents of a web browser’s cache and studies how long the system takes to respond to different inputs.


Spoofing is a technique used to gain unauthorized access. There are different types of spoofing. Some of the common spoofing includes-

  • IP Spoofing
  • ARP Spoofing
  • MAC Spoofing
  • DNS Spoofing
  • Email Spoofing

Man in the Middle Attack

A Man in the Middle Attack is when a hacker gets in between two endpoints – a client and a server. In this attack the victims are unaware that a third person exists between them. The attacker can control the communication between them. To prevent this attack, SSL protocol are installed in the servers. SSL (Secure Sockets Layer) is basically an encryption based security protocol.

This tutorial on Common Cyber Attacks and Breaches is contributed by Rajnish Kumar. If you like TheCode11, then do follow us on Facebook, Twitter and Instagram.

Previous Post Next Post

Contact Form