Skip to main content

Common Types of Cyberattacks and How to Avoid Them

November 8, 2019

There are a few common types of cyberattacks. Cybercrime is proving an increasingly costly drain on the global economy. Research indicates that cyberattacks could cost companies globally about $5.2 trillion over the next five years—that’s more than a trillion dollars a year. Unfortunately, when there’s that much money at stake, there’s going to be a criminal population that’s both enthusiastic and innovative about fighting for a piece of those funds. The result of that criminal innovation is a whole selection of strategies for fleecing the unsuspecting of their money or information that can parlayed into money, just a few of which are featured here. Thankfully, there are strategies, like learning how to remove personal information from Google, that anyone can leverage to protect themselves against cyber predators.

Password Attacks

Password attacks are one of the oldest and least sophisticated, but still often effective, form of hacking and cyber-theft. The attacks are often perpetrated in two ways: targeted and brute force. Targeted attacks require the hacker to have discovered a password by social engineering, using someone’s personal information as potential passwords, or eavesdropping on information sharing between servers online to discover a password. Brute force attacks involve bombarding the password entry with thousands or millions of common passwords and even random words (those are also called “dictionary attacks”).


It’s become something of a cliché, but it remains good advice: Have long passwords that are combinations of different cases, letters, numbers, and special characters. Entirely random strings are best. Never use personal information, children’s names, birthdays, hobbies, and so on as passwords. And don’t leave passwords written anywhere someone could see them.

Man-in-the-Middle Attacks

Man-in-the-middle (MitM) attacks are also referred to as eavesdropping attacks. They involve a hacker gleaning information by “eavesdropping” on the sharing of information between servers. Once the MitM hacker gets access to that two-party information traffic, it’s easy to steal any of the information being shared, including (but not limited to) credit card numbers and bank information. MitM attacks are most often launched from unsecured Wi-Fi networks, particularly public ones, and by taking advantage of a device that’s been breached by a malware insertion.


Preventing MitM attacks also requires some basic internet safety. Don’t use public, unsecured Wi-Fi networks, particularly in places such as coffee shops and fast food restaurants. (These are very popular haunts for cybercriminals.) Only do business on secure “HTTPS” sites. And always be sure your anti-virus and anti-malware security programs are up-to-date.

Learn how to avoid phishing scams

Phishing and Spear Phishing

Phishing and spear phishing are both popular with scammers because they’re cheap, relatively low risk, and often effective. They involve cybercriminals sending emails with an urgent call-to-action: A payment has been declined, a bank account has been compromised, you’ve been dropped from a service, and so forth. The link included to help resolve the issue introduces malware onto your computer, generally giving hackers access to it. Spear phishing is a less scattershot mailing list approach and involves the use of specific, researched information about someone and their organization to make the attacks more targeted and realistic.


Practicing general email security strategies can certainly be helpful, as is removing or limiting your personal information that hackers could have access to online. Think twice about the personal information you offer online and share on social media and consider hiring a firm to remove personal information from Google as well as data broker sites. Perhaps most importantly: Don’t click links in emails unless you’re 100% certain the email is valid and genuinely came from the sender. If an unexpected email comes in from your bank, for instance, call your bank and confirm before you click.

About DeleteMe

DeleteMe sets the standard in the industry for ensuring the privacy of your data and optimizing your online security. Based in Boston, DeleteMe has built this reputation by leveraging the expertise of their specialists and by providing over 10 million successful consumer opt-outs. DeleteMe has unmatched experience in and cutting-edge tools for securing data privacy and providing consumer security. They can assist with information removal from Whitepages and other data broker sites as well as search engines like Google.

Keep all of your personal information as private as it should be, at

Will Simonds runs Senior Marketing Operations at DeleteMe, and is a steadfast privacy advocate who has a resolute dedication to online privacy solutions and helping people regain their privacy. …

Don’t have the time?

DeleteMe is our premium privacy service that removes you from more than 30 data brokers like Whitepages, Spokeo, BeenVerified, plus many more.

Save 10% on DeleteMe when you use the code BLOG10.

Hundreds of companies collect and sell your private data online. DeleteMe removes it for you.

Our privacy advisors: 

  • Continuously find and remove your sensitive data online
  • Stop companies from selling your data – all year long
  • Have removed 35M+ records of personal data from the web

Special Offer

Save 10% on any individual and family privacy plan with code: BLOG10

Related Posts

Online reputation is becoming more complicated than ever.  More and more people are having …
DNA Testing companies like Ancestry DNA, 23andMe, MyHeritage, Helix, and FamilyTreeDNA might be u…
Why Online Reputation Management Is ImportantWhat Can Be Done About It?About DeleteMe The int…