En | Ar

Wednesday, November 2nd, 1988: the first cyber-attack was introduced. A Harvard graduate named Robert Morris, launched a “worm” attack that propagated through the network of more than 60,000 university computers. This situation is out of the blue, and it raises some questions… Are there other types of similar attacks? Are we still vulnerable to them? Should we be concerned while all these sorts of technologies appear around us?

In short, absolutely. Fast forward 36 years, and our reliance on digital devices grows, as does the number of cyber threats we face, especially with the hasty development our technology observes. You may have heard that “your phone is listening to you” or “you’re always being watched through your device”. While these claims might be exaggerated, they do highlight key risks we face. For instance, you could let in malware by accidentally clicking on a link or an ad that leads to the self-installation of a virus, without any disclaimer or consent. This allows it to freeze your device’s screen, randomly restart it, or even shut it down completely. 

Another important risk to avoid is the Man-in-the-Middle (MITM) attack. This type of attack is often accomplished on public Wi-Fi networks. The scenario usually goes like this: you’re relaxing in a cozy café, minding your own business, before deciding to check your bank account to see if your paycheck has been deposited. While this occurs, a hacker can intercept the communication between you and your bank account. They could steal your personal details or even trick you to complete a certain transaction or transfer funds using a particular impersonation technique.

These attacks are just the tip of the iceberg. Every day, countless cyber threats lurk in the digital shadows, ready to exploit vulnerabilities. Brute-force attacks, Trojan horses, Botnets, and so many more cyber threats are launched every 3 seconds, according to USA Today. Additionally, the average amount of money lost by businesses because of cybercrime in 2023 was $1.3 million, and this number just keeps increasing. We are always exposed to these threats, no matter where we are, as long as we have a device connected to the internet.

Luckily, there are several measures you can adopt to mitigate the risk of being attacked. However, before listing the technical ones, there’s a crucial step to take into consideration: awareness and education. Understanding the various types of cyber-attacks and how they can occur is crucial to protecting yourself and others around you. On top of this foundation, you should also regularly check for updates on your device. These updates are usually accompanied by critical security patches. Also, ensure creating and using strong, complex passwords while frequently modifying them. Furthermore, enable Two-Factor Authentication (2FA) for your accounts. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. Optionally, surf the internet through a Virtual Private Network (VPN). A VPN is like having your own secret tunnel that you can use to travel by car instead of using the public highway, where everyone can see you. When you use a VPN, the traffic you send is sent through this secure and encrypted tunnel, which makes it harder for hackers to attack.

By the time you finish reading this article, millions of individuals will have been affected by cyber-attacks.  Don’t recklessly share your personal details on the internet or trust all links and ads you come across there. Always remember: your online safety and privacy are paramount. Albeit, with the relentless pace of technological advancements and the boundless cyber capabilities of criminals, cyber-related concerns grow more daunting, and an unsettling truth persists: can we ever be truly secure?

PARTAGER