Saturday, October 6, 2012


A cyber attack is a method by which an individual, through a computer system, try to take control, destabilize or harm another computer system (computer, private network, etc.).

There are different types of attacks. Some are:
Denial of Service Attack, 1 also called DoS (Denial of Service), is an attack on a computer system or network that causes a service or resource is inaccessible to legitimate users, usually causing the loss of connectivity
by consumption of network bandwidth of the victim network or overload the system computational resources of the victim.
Man in the middle, 2 MitM sometimes abbreviated, is a situation where an attacker monitors (usually via a sniffer) a communication between two parties and falsifies the exchanges to impersonate one. REPLAY attacks, 3 a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. It is conducted by the author or by an adversary who intercepts the data and retransmits it, possibly as part of a masked attack.


Zero-day attack, attack against a computer, from which they exploit certain vulnerabilities or security holes in a program or programs before they know them, or that, after publication of the existence of the vulnerability, perform the attack before the publication of the patch that solvente.

Normally the cyberattacks are produced by a group of hackers.

One hacker  is a person who belongs to one of these communities or different but not completely independent subcultures

At present it is used of current form to refer mainly to the IT criminals, due to his massive utilization on the part of the mass media from the decade of 1980. Him the so called ones can add to the criminals " script kiddies ", people who invades computers, using programs written by others, and who has very little knowledge on since they work.

From now the most famous groups of hackers are .

Anonymus and LulzSec and they fight together against any government that doesn’t obey tha laws, so they hack their system to steal their information and spread it to the public and blocking their websites.

LulzSec                        Anonymus

Ramses . Normally we received cyber attacks daily for example, when we visit a web page we have never seen we could be in danger and even if we don’t got the enough protection to protect our data and information.

Genesis .we have to be careful when we gave our information to other people we are not only in danger but our family could be too.

Jorge .can be used to steal your information , your identity, money, accounts ,personal information and they can do whatever they want or spread it in public or just steal your information and money.