cPanel VPS
Pre-installed cPanel for your website
Private Cloud
SSL Certificate
Build your customer trust and confidence.
We offer range of hosting services that support the demands of your website, or application.
Register your business domain or transfer your domain to Casbay anytime.
Register .MY Domain
Register Domain
Domain Privacy Protection
Protect your private information with Whois.
It’s not about what we say, it’s about what we do. Learn more about Casbay’s background and confidently join our growing community.
Our vision, history and photo gallery.
Privacy Policy
Understanding Casbay Privacy Policy.
Client Reviews
Find out what our clients say about us.
News
The latest news and media releases.
Cyber attacks hit businesses every day. There are two types of Cyber Attack of companies that have been hacked, and those who don’t yet know they have been hacked. A cyber attack will against a computer system, network, internet and device.
Here the types of Cyber Attack:
Malware is a software that is designed to cause damage to a single computer, server or computer network. These cyberattack spread by malware such as Worms, viruses and trojans distinguished from one another.
This technique by craft email to target into some harmful action. The recipient is trick into downloading malware that important document or by click on the link that takes to a fake website.
It is also is known as eavesdropping attacks, that occur when you insert into two transactions. That the attackers will interrupt the traffic and filter to steal data. Two ways of MitM attacks:
1- Public WI-FI, this way is easy for attackers because people will use Free WI-FI. They can insert between visitor device and network and can easily pass all the information to attacker between visitor.
2. An attacker can install software to process all of the victim’s information
A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfil legitimate requests. In addition, attackers can also use multiple compromised devices to launch this attack. This is know as a Denia-of-service attack.
The Structured Query Language (SQL) controlled a database server behind a web application. After that Attackers use SQL Injection vulnerabilities to bypass application security measures. The technique SQL Injection used to Attack by add, modify and delete records in the database.
And now you already know types Cyber Attack and be safe. Learn more for Cyberattack.