Popular cyber attack methods
According to Mr. David Langley, a cybersecurity expert at secureTech Group (UK), there are a number of popular cyber attack methods that are often aimed at ordinary users, including:
1. Phishing (fraud via email or text messages): This is the most common form, attackers send fake emails or messages to reputable organizations to deceive users into providing personal information, bank accounts or passwords.
2. Malware: Malware can be installed through attachments, software of unknown origin, or websites infected with malware, thereby taking control or stealing data on the computer.
3. ransomware: A special malware that encryps users' data and requires a ransom to unlock it. This format causes serious damage if there is no data backup.
4. Social technical attack: Is a type of cyber attack based on human psychological manipulation to deceive others into providing sensitive information or performing actions that endanger security.
5. unsafe public Wi-Fi:Attacking unsecured public Wi-Fi networks, allowing bad guys to steal data transmitted over the network.
Effective prevention for common users
Ms. Sophie Martinez, a cybersecurity expert at Cyber Shi Shield (USA), recommends that common users apply simple but very effective measures to protect themselves:
Be careful when opening strange emails and messages: Always check the sending address carefully, avoid clicking on links or downloading attachments from unknown sources.
Use virus-killing software and update regularly: Security software helps detect and prevent malware in a timely manner.
Create strong passwords and do not use shared passwords: Passwords should include capital, connotations, numbers and special characters. Use a password manager to manage multiple accounts securely.
Update operating system and software: Updates to patch security vulnerabilities help reduce the risk of exploitation.
Regular data Backup: Helps recover quickly when attacked ransomware or hardware failure.
Limit the use of public Wi-Fi or use VPNs: When you need to connect to a public network, use VPNs to encrypt data.
Over-the-counter users are the first layer of defense against cyber attacks, Langley stressed. Raising awareness and changing the habit of using computers and the internet will significantly reduce the risk of attack".