tele Badges


  • Types of cyberattacks.
    Here is a list of common cyberattacks aimed at inflicting damage to a system.

    Man in the Middle attack: The attacker puts himself in the communication between the sender and the receiver. This is done to eavesdrop and impersonate to steal data.
    Phishing: Here, the attacker will act as a trusted entity to perform malicious activities such as getting usernames, passwords, and credit card numbers.
    Rogue Software: It is a fraudulent attack where the attacker fakes a virus on the target device and offers an anti-virus tool to remove the malware. This is done to install malicious software into the system.
    Malware: Malware is software that is designed to attack the target system. The software can be a virus, worm, ransomware, spyware, and so on.
    Drive-by Downloads: The hacker takes advantage of the lack of updates on the OS, app, or browser, which automatically downloads malicious code to the system.
    DDoS: This is done to overwhelm the target network with massive traffic, making it impossible for the website or the service to be operable.
    Malvertising: Malvertising refers to the injections of maleficent code to legitimate advertising networks, which redirect users to unintended websites.
    Password Attacks: As the name suggests, here, the hacker obtain credentials like passwords.
    Check out our blog on Cyber Security Tips and Best Practices to prevent Cyber Security attacks
    0 Answers 0 Shares
  • 🎉🏆 ቴሌፎረም የጥያቄና መልስ ውድድር!! 2ኛ ዙር ጥያቄ!
    🎉🏆 ቴሌፎረም የጥያቄና መልስ ውድድር!!    2ኛ ዙር ጥያቄ!   ❓ ኢትዮ ቴሌኮም በብዙ የአገራችን ከተሞች እያስተዋወቀው የሚገኘው እጅግ ፈጣን የሞባይል ኔትወርክ አገልግሎት ምን ተብሎ ይጠራል?   ✍️ መልስዎን ቴሌፎረም https://teleforum.ethiotelecom.et ላይ ብቻ ያስቀምጡ!   ቤተሰብ ይሁኑ፤ ይመልሱ፤ ይሸለሙ!!   ደንብና ሁኔታዎች ተፈጻሚነት አላቸው!     #teleForum #Ethiotelecom #telebirr #DigitalAfrica #DigitalEthiopia #RealizingDigitalEthiopia

    Read More

    Like
    1
    2 Answers 0 Shares
More Stories