Hacking is the primary method for infiltrating networks. Through the injection of specialist software, hackers seek to gain unauthorised access to computer networks and systems and take administrative control of these.
Successful hacking attacks can compromise data stored on the network of individuals, products, strategic plans, sensitive data and commercial data. This data is often then sold on to fraudsters.
Hacking also has the potential of putting the operation of systems which control physical infrastructure at risk.
DDOS attacks prevent legitimate access to online services by swamping the communications links with a mass of traffic so that users are unable to access the service as it can not handle the volume of incoming traffic.
These attacks are usually undertaken through the use of botnets – a group of compromised, controlled computers which involuntarily send messages simultaneously to the computer or server.
Ransomware is a growing cyber threat to both individuals and businesses. Ransomware is a type of malware that locks your computer or mobile device and encrypts your files. When this happens the only way you can get access to your files is to pay a ransom. If you're a victim of ransomware - do not pay. There is no guarantee you will get your files back.
The No More Ransom project offers decryption keys for many different types of ransomware. Visit the No More Ransom website for advice on protecting yourself from ransomware and what to do if you're a victim.