

Network Attacks
There are several different methods in which hackers and scammers form an attack. Scroll down for the names and descriptions of some of the most common methods. For a more interactive journey click here.
Malware
Malware is any malicious software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses
Viruses are pieces of code capable of copying themselves, typically causing detrimental effects, such as corrupting the system or destroying data.
Spyware
Spyware enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Worms
A computer worm is a standalone malware program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Adware
Adware is a type of software that takes advantage of online shopping tendencies, by automatically displaying or downloading advertising materials such as banners or pop-ups when a user is online.
Phishing
Phishing is the fraudulent practice of sending emails pretending to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
WIFI Attacks
A Wi-Fi de-authentication attack is a type of denial-of-service that targets communication between a user and a wireless Wi-Fi access point.