top of page
  • Konstantinos Bagios


In the era of the telecommuting revolution, the explosion of cybersecurity problems is a fact. There have been 238% more cyberattacks against banks since the coronavirus crisis. What is a cyberattack and how does it present itself?

1971: A revolutionary computer program that bounces from computer to computer. It is the first computer worm, which makes Bob Thomas history. The worm was not malicious, but it displayed a message on each infected screen stating:

"I am the creeper: catch me if you can. "

1989: First denial of service (DoS) attack

Robert Morris creates a worm computer to highlight security vulnerabilities such as Sendmail Unix and weak passwords. However, even though the goal was not to cause major problems, the code was written in such a way that the worm over-replicated causing damage estimated at between $ 100,000 and $ 10,000,000. This is the first DoS attack in history.

What is a Cyberattack?

You can read in the press and even hear around you regularly about cyberattack facts. Whether on an individual or corporate level, the number of cyberattacks is increasing. At first, they only concerned large companies, but cyber-malware has become more democratic and today concerns companies of all sizes. What is a cyberattack?

A cyber attack is any malicious activity that takes place through a computer or network that aims to modify, destroy, steal, listen to or gain unauthorized access to the information of the rightful owner.

Since the coronavirus crisis, attacks on banks have increased by 238%. 80% of companies have seen an increase in cyber attacks and 27% of attacks target banks or healthcare. Cloud-based attacks increased by 630% between January and April 2020.

The most dangerous “CryptoLocker Ransomware” attack was launched in September 2013 and spread via email message attachments. The virus encrypted users' files by blocking access. In this type of attack, victims must pay a sum in Bitcoin in order to be able to regain access to their files and / or documents via a specific key allowing the information to be decrypted.

To face this growing threat, any company must be made aware and have procedures in place to protect itself.

The main types of cyberattacks

- Denial of service (DoS) and distributed denial of service (DDoS) attacks

- Man in the middle attack (MitM)

- Phishing and spear phishing

- Stealth download (drive) -by download)

- Password cracking

- SQL injection

- Cross-site scripting (XSS)

- Eavesdropping

- Birthday attacks

- Malware What are

What can we expect in the future?

Cisco researchers predict that in a few years cyber attacks will potentially be able to destroy the internet. The networking giant predicts that Russia has already developed systems that would be able to cause Internet disruption to entire countries for weeks or even months.




bottom of page