• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Top Seven Network Attack Types So Far In 2015

June 30, 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

There’s no doubt that small businesses are under attack from hackers and cyber-criminals. Typically, small companies have less secure networks and looser security standards, making them easy targets.

The latest Threat Report from McAfee Labs details the types of attacks against small businesses. The chart shows the most common network attacks detected in Q1 2015.

Denial of service attacks – 37%
A denial of service (DOS) attack attempts to make a resource, such as a web server, unavailable to users. These attacks are very common, accounting for more than one-third of all network attacks reviewed in the report.

A common approach is to overload the resource with illegitimate requests for service. The resource cannot process the flood of requests and either slows or crashes.

Distributed denial of service (DDoS) attacks are popular today. This approach distributes the task to a number of computers.

Top-network-attack-types-2015

Brute force – 25%
Some attacks look for a back way in, but a brute force attack tries to kick down the front door. It’s a trial-and-error attempt to guess a system’s password.

One in four network attacks is a brute-force attempt. Automated software is often used to guess hundreds or thousands of password combinations. There are many ways to defend against brute force attacks, but the simplest is to lock accounts after a number of failed login attempts.

Browser attacks – 9%
Browser-based attacks target end users who are browsing the Internet. The attacks may encourage them to download malware disguised as a fake software update or application.

One of the best ways to avoid browser-based network attacks is to regularly update web browsers and browser-related services such as Java and Flash. This helps ensure newly discovered security vulnerabilities are patched before they can be exploited.

SSL attacks – 6%
SSL attacks aim to intercept data that is sent over an encrypted connection. A successful attack enables access to the unencrypted information. SSL attacks were more popular in late 2014, but they remain prominent today, accounting for 6% of all network attacks analyzed.

Shellshock attacks – 7%
“Shellshock” refers to vulnerabilities found in Bash, a common command-line shell for Linux and Unix systems.

Backdoor attacks – 2%
A backdoor is a type of attack that bypasses normal authentication to allow remote access at will. Backdoors can be present in software by design. They can also be enabled by other programs or created by altering an existing program. Backdoors are less common and often used as part of targeted attacks.

Botnet attacks – 2%
A botnet is a group of hijacked computers that are controlled remotely by one or more malicious actors. Millions of computers can be caught in a botnet’s snare. The European Cybercrime Unit recently announced takedown of the Ramnit botnet, which infected more than 3.2 million Windows PCs.

Filed Under: Network, Ransomware, Security, Vulnerability Tagged With: Network, Security, vulnerabilities

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.