Sending fraudulent emails to a large number of email addresses, claiming to be from a reputable company or trusted source to try and gain access to your details, often by coaxing the user to click on a login button
A scammer will send a fake text message, pretending to be from the government or human resources of a company, this scam is used to trick an individual into giving out confidential data
A brute force attack works by an attacker repeatedly trying multiple combinations of a user's password to try and gain unauthorized access to their accounts or devices
an attacker finding out the length of a PIN code, then trying each possible combination, this method tries popular words or phrases that are used in passwords
A Denial of Service Attack (DOS attack) occurs when an attacker repeatedly sends requests to a server to flood the server with traffic, causing it to overload the system
how does Distributed Denial of Service (DDOS) attack, work?
This works in a s similar way to a DOS attack, with the main difference being that the traffic comes from multiple distributed devices in a coordinated attack on a single server/network
Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software