Advanced IT Services are an active member of the East Midlands Cyber Security Cluster; a cluster of varying organisations across the UK that work together to share best practises, provide vital communications and discuss reason spates of Cyber Activity. This allows us to be at the very forefront of Cyber Security.

Contact us today to find out how we can help.

AIT – A security partner you can count on.

 

Types of Malware

Phishing

Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat especially within Education settings.

Man-In-The-Middle Attack

Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

Two common points of entry for MitM attacks:

◆ On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device and the network. Without knowing, the visitor passes all information through the attacker.

◆ Once malware has breached a device, an attacker can install software to process all of the victim’s information 

Denial-of-Service Attack

A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfil legitimate requests. Attackers can also use multiple compromised devices to launch this attack.