3 common types of cyber attack and how to avoid them

Cyberattacks, malicious acts against computer devices have often made headlines in recent years. Even the biggest companies can fall victim to cybercriminals. You will certainly remember that of 2017, called WannaCry, which affected large companies such as FedEx and Renault. That same year, Netflix was also the victim of a cyber attack.

The idea is not to panic, but only to make you aware that even the biggest companies can be victims of cybercriminals.

In this article, I suggest you learn more about the 3 most common types of cyberattacks and how to avoid them.


Phishing is certainly the most widespread cyber attack on the web. It is a phishing technique which consists of usurping the identity of a trusted person or company to collect personal information (bank identifiers, passwords, etc.).

Most of the time, you receive an email, in which you are asked to click on a link.

While you think you have been redirected to the site of the structure in question, you are in fact diverted to a site created identically by cybercriminals. You are then asked to enter certain information, and that is when it is collected and then exploited by the “pirates”.

This cyber attack is not directly related to a security breach in your computer system. On the contrary, it exploits your lack of attention.

Be alert to the emails (or even SMS) you receive:

  • Try to identify spelling mistakes or poor quality visuals
  • Check the structure of the email address
  • Do not click directly on the link, but enter it manually in your search bar
  • Before entering confidential data, make sure that the URL of the link begins with “https”
  • Contact the organization that seems to have been usurped to remove any doubts about the message received


Note that most organizations never ask their customers to enter confidential information by email or SMS.

Man in the Middle Attack (MITM)

This cyber-attack can take various forms. Most of the time, a hacker manages to position itself between a client and a server to intercept the exchanged data.

In a more concrete example, the attack could take place at the moment when you (the customer) fill in the information on the site of your bank (the server). The cybercriminals collect your data and then uses it without your knowledge.

Typically, MITM cyberattacks occur when you connect to a compromised public Wi-Fi network. By usurping the latter, the cybercriminal can spy on all your actions on the web and easily recover your passwords, your credit card number, and even see your exchanges by SMS, on Facebook etc.

The best prevention against a Man in the Middle attack is the use of a VPN which encrypts your data, making it incomprehensible to hackers.

Also, avoid connecting to public networks to make purchases, connect to your bank’s site or do anything else that requires you to enter or communicate sensitive data.


Malware, a contraction of “malicious” and “software”, is a malicious program that installs on your computer or any other device.

Among the most widespread malware, we can cite viruses, ransomware which hold your personal data for ransom or even cryptojacking, which uses the resources of the computer to mine cryptocurrency secretly.

Malware is the “easiest” cyber threat to avoid because it involves device security. To protect yourself, install firewalls and antivirus.

Another way to guard against this kind of cyber attack is to keep your operating system up to date. This allows your device to install the necessary fixes for security breaches.

Note that the appearance of a toolbar that you have not installed, a sudden decrease in the performance of your device or constant pop-ups should alert you. These are signs that you are infected with malware.

What do you think?

Written by Sean Longstaff


Leave a Reply

Your email address will not be published. Required fields are marked *



8 keys to take the best photos with your cell phone

Telework and cybersecurity: how to connect to the network safely