The year 2022 continues to challenge us. There is so much happening that it’s almost impossible to track something particular.

Both economic and political difficulties are actively discussed over the Internet. Social media and websites became our main sources of information. Moreover, WEB is the place where people work, communicate, and share sensitive information sometimes.

Consequently, it attracted scammers who look for internet “newbies” to deceive them in order to get money for confidential information for further crimes.

In 2022, cybercriminals use all known means for hacking and scamming to corrupt important information, compromise people, and destabilize websites and data centers. 

Types of attacks used in Q3 2022

What are the most popular threats when “surfing” the internet?

DeepfakesThis technology became so good that even experienced users can’t tell the difference between a real person and a fake video. The video below displays a deepfake of the actor Tom Cruise. The appearance, and the voice — are all done so smoothly that it actually scares a little 🙂

@deeptomcruise

I love magic!

♬ original sound – Tom

Unfortunately, this technology is used not only for fun videos but for scumming or compromising purposes. 

Phishing. One of the most popular ways used by scammers to deceive people. Emails with deceiving headings (“You won $100! Open for details”, “Important message from your company”, etc), Websites-clones that contain links to malicious pages made by hackers or scammers.

Malicious software. It is important to be careful with clicking on links in suspicious emails or websites. Otherwise, such software can corrupt files on your device or let a scammer into your system.

Cloud services. Working in a cloud is always a challenge. Internet outage? No access to your data. Cyber attack on cloud public servers? Data loss. Simplicity is great and it saves some time, but what’s on the internet belongs to the internet. Some security measures work and some don’t. That is why, if you want to protect essential data, you should learn about self-hosting and basic administering.

Yes, it takes some to figure everything out, but information security is worth it.

Leave a Reply

Your email address will not be published. Required fields are marked *