• NEWS
    Sat, 1:00 pm - 1:05 pm
    [ - ]


Radio Islam Logo

((( Listen Live )))))
Radio Islam Logo

Why Do Users Get Attacked – Part 2

Nov 30, 2021

Technology is growing every day, and as it grows, it transforms our digital world. Internet use is increasing exponentially, making us correspondingly more vulnerable to cyber-attacks. By learning how cybercriminals attack and how to secure our systems and data against those attacks, we will be able to minimize the risk of data breaches and the devastation they bring with them.

Before getting into how to secure data from breaches, we must try to understand the motives behind these attacks. By knowing the motives behind the attacks, it’s easy for cybersecurity professionals to secure the systems. The main motives for attacking an organization’s or individual’s computer are:

Disrupting a business’ continuity:
If a business is disrupted, it causes great harm to the organization in the form of lost profits, fraud, and damage to its reputation. And one way that has become common is through cybercrime.

Information theft and manipulating data:
Hackers take confidential information that they steal from organizations and sell it to individuals or groups on the black market. This sensitive and private information is very often at the core of the business` operations.

Creating chaos and fear by disrupting critical infrastructure:
Cyber terrorists attack a company or a government body to disrupt their services, doing damage that can potentially affect an entire nation.

Financial loss to the target:
Hackers attack an organization or business and disrupt their services in such a way that the target has to allocate substantial funds to repair the damage.

Achieving a state’s military objectives:
Rival nations continuously keep an eye on each other and sometimes employ cybercriminal tactics to steal military secrets.

Demanding ransom:
The hackers employ ransomware to block a website or servers, releasing control only after a ransom is paid.

Damaging the reputation of target:
The hacker may have personal reasons to attack an organization or individual so that their reputation suffers.

Propagating political beliefs:
Hackers may infiltrate websites to promote a certain political agenda, usually to sway voters to vote a certain way.


Prime Spot!!!


Related Articles

Points to consider – Part 5

Points to consider – Part 5

Important Points for a Muslim to Consider in Summer So many of us complain about how hot it is and how long the days are, but unfortunately there are very few of us who actually take benefit and use these hot and long days to our advantage. Here are a few important...

read more
Healthy foods for summer – part 4

Healthy foods for summer – part 4

Healthy summer foods to beat the heat and boost health Summer brings with it fresh fruits and vegetables that are a delight to devour during the intense heat, and they come with the added benefit of being healthy for your body. It`s hot, scorching and sweaty days and...

read more
Benefits of Summer – Part 3

Benefits of Summer – Part 3

Sunny skies and rising temperatures do more than make our environment a pleasant place. They also provide some very significant benefits to our health and wellbeing. Sunlight helps to regulate almost all our bodily processes, as well as acting as a psychological...

read more
An Amazing Hadith about Summer – Part 2

An Amazing Hadith about Summer – Part 2

عَنْ أَبِي هُرَيْرَةَ، عَنِ النَّبِيِّ صلى الله عليه وسلم قَالَ ‏"‏ إِذَا اشْتَدَّ الْحَرُّ فَأَبْرِدُوا بِالصَّلاَةِ، فَإِنَّ شِدَّةَ الْحَرِّ مِنْ فَيْحِ جَهَنَّمَ وَاشْتَكَتِ النَّارُ إِلَى رَبِّهَا فَقَالَتْ يَا رَبِّ أَكَلَ بَعْضِي بَعْضًا‏.‏ فَأَذِنَ لَهَا...

read more
Why New Resolutions so Often Fail – Part 3

Why New Resolutions so Often Fail – Part 3

So we began the discussion yesterday on why so many of our new resolutions fail – why they are somewhat easy to make, yet so hard to follow through with. Today we will take you through a few more reasons why these resolutions don’t see the end of January. “Instead of...

read more

Subscribe to our Newsletter


Submit a Comment

Your email address will not be published. Required fields are marked *