Breaking News
Home / Cyber Attacks / What Is Rising Cyber Attacks and How Does It Work?

What Is Rising Cyber Attacks and How Does It Work?

The recent rise of cyber attacks became a wonderful concern for all the distinguished organizations world wide. what is a cyber attack? it is a shot to realize management to the laptop and track the movements of a private or a gaggle whereas not their permission.


this could be the new form of weapon to fight against a country. Why waste bullets and money once a country is pack up in exactly minutes by aiming the ability grids, national banks etc. this could be referred to as cyber warfare. The social scientist describes cyber-warfare as a result of the ‘fifth domain of warfare and so the North yankee nation Defense recently classified associate degreey serious cyber attack as AN act of war.

Previously hackers, for the sake of fun, accustomed target single user computers but bit by bit they began to form groups, powerful ones to attack the big shots. As I started writing this post, a current attack had occurred. International cash (IMF) reported that its ADPS had a major breach. it fully was targeted by hackers UN agency they believe area unit connected to a faraway government. The hackers scarf email and completely different necessary documents.

  • As we have a tendency to tend to any or all perceive, Gmail was attacked where accounts of high state officers from the North yankee nation and Asia, military personnel, journalists and many of others were hacked. the only action that was taken by Google was to trace the attack. What else {may we have a tendency toll|could|might|can|may|would|may possibly|may perhaps} be done? we tend to do not expect them to attack or arrest those who were guilty. Its the work of the Pentagon but sadly it isn’t doing torrential to tackle such problems… it fully was discerned that it came from a province in China, Jinan. China on the other hand warned Google to not purpose fingers at them whereas not correct proof otherwise they’d face forceful actions.
  • once Gmail, succeeding target was Lockheed Martin. For those who do not perceive Lockheed Martin, it is a corporation that deals with yank half, Security, Defense and completely different technology company. As presently as a result of the attack passed, Lockheed detected it fast and took security measures that enabled them to be secure. No valuable data were compromised. I have to be compelled to say, Lockheed was lucky.
  • Sony,the amusement huge was jointly attacked, not one, but a pair of sequent attacks throughout a matter of days. The hackers scarf ample personal data and parole of all the accounts associated with the PlayStation Network.This was a blow to any or all or any the gamers owning the PS3. I bet the rival, XBOX 360 has already taken security live for its XBOX Live network, that has further users than PSN (PlayStation Network).
  • instead of XBOX 360 being the target, poor Nintendo became a victim but it fully was reported that no company or personal data was lost. i assume they were lucky that day!
  • The gambling publisher from UK- Codemasters, UN agency recently free Dirt 3, was hacked in Chief Executive Jefferson Davis’ Birthday. it’s sad that the names, all the non-public data, information processing addresses were all stolen throughout this attack. in line with Codemasters, they’d no set up UN agency staged the attack and also the means many users data were stolen.
  • we have seen that concerning all of them were attacked but there is this special cluster UN agency call themselves LulzSec, UN agency sent a warning email to the National Health Security in uk. They were kind enough to not attack them but specific in academic degree email to them that their network servers were merely approachable. in line with Lulzsec, they required to help them. therefore generous! examine the letter they sent to NHS here! Lulzsec jointly claims responsibility for the Sony attack.

So as we are going to see, there has been a good deal of attack inside the past days. Such attacks cause a wonderful loss in every revenue and so the name of the company. for example, Sony’s breach clearly caused a panic and then it caused most of the users to either stop enjoying inside the network or just shift to the other console. a company featured by academic degree attack shows that it simply didn’t invest further in security measures. This makes the users to trust less to those corporations UN agency have featured such academic degree attack.

Moreover, the parents behind the attacks do not appear to be some laptop computer geek sitting in his house and hacking or a young adult practiced in programming merely testing out some hacking tricks. they are academic degree organized cluster with practiced folks UN agency have a motive to undertake to to at least one factor nice.

The rise of cyber attacks can be a transparent sign that inside the long run, it’s going to cause wars. As world organization government Anders Fogh somebody aforesaid,

“A well musical organisation cyber attack can clean up the ability in your house, your city, your country. it’ll pack up traffic management. it’ll pack up banks. In short, a cyber attack can bring a country down whereas not one soldier having to cross its borders… it’s no exaggeration to state that cyber attacks became a current form of permanent, low-level warfare.”
In order to tackle such draw back, enforcement agency has already taken their steps to arrest those responsible associate degreed sq. measure|are also|are} beefing up the protection of the organisations UN agency area unit having risk of AN attack. I seriously do not want to see another war being fought thanks to this reason. For one soldier UN agency would take the initiative to attack a country through the net, ample of us would be at risk! Hope these issues would be resolved through negotiations rather than partaking throughout a war.

Md. Mushfiqur Rahman

About admin

Check Also


Little Known Ways to Types of Malware

Types Of Malware Malware continues to be a comparatively uncommon term, and isn’t acquainted to …

Leave a Reply

Your email address will not be published. Required fields are marked *