Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

What is a DDOS attack?

Written by  Feb 18, 2019

A DDoS attack is a specific sort of cyber crime. A Distributed-Denial-of-Service (DDoS) is a distributed Denial-of-Service (DoS). This occurs when a requested service is only to a certain extent or not at all available.

Most of the times this happens when the IT infrastructure is too busy. Attackers use this type of cybercrime to sabotage companies without DDoS protection.

What does a DDoS attack look like?

When launching a DDoS attack the attacker/s aim at making a service or a server unavailable. In order to do so they infect one or various computers with malware. The attackers use this infected computer network, known as botnet, to launch their DDoS attack. Using the botnet, they attack their target by sending a large amount of requests to the infrastructure.

The more computers are in one botnet, the stronger is the attack. Attacked servers without DDoS protection become overwhelmed with so many requests, their Internet connection breaks down. Websites either load extremely slowly or crash altogether.

Phishing ServiceAlso see: What is Phishing?

Who are the attackers?

Individuals or groups, political activists, competitors, angry clients or just wannabe hackers trying to make a name for themselves . Their motives for a DDoS attack vary: Extortion, harm competitors, envy or send signals against political decisions. The goal of attackers is always the same, however: They want to cause the biggest possible damage to their victims. Without an effective DDoS protection attackers easily succeed.

What are the techniques of a DDoS attack?

Cyber criminals use different types of DDoS attacks. There are various well known tools freely available online that can attack in differing ways.

One of the most common types is to overload system resources and network band widths. In the past few years, cyber criminals have increasingly shifted their attacks to applications. Practices and bandwidths of DDoS attacks change from day to day though.

safe browsingAlso see: Internet Security: Best Practices for Safer Browsing

What are the consequences of a DDoS attack?

An attack always has a negative impact on the affected company, regardless of the technique. Sadly, the companies can feel the repercussions for years after the attack.

Economic damages

A few minutes offline can cost thousands of pounds. Lost sales and wasted marketing budgets only form one part of the financial damages.

Cybersecurity for Beginners
amazon uk

Business reputation

A DDoS attack entails an incalculable damage to one’s reputation. To restore the image costs many resources and can take to years.

Disgruntled users

When the target audience cannot reach your website, the frustrated user might leave and buy at the competitor’s website.

Data theft

Possible theft of company or client data can have unpredictable repercussions. It can wipe out businesses completely.

Carl Perkins

A security tech expert, Carl specialises in IT Security having worked in the field for over 10 years and has previous Tech admin roles to his credit. He is very experienced and his contribution is invaluable to us.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.


Popular News

Jun 13, 2020 IT Security News

Microsoft announces major issue in Windows 10 June 2020 updates

On 9th June, 2020, Microsoft released cumulative updates for supported versions of Windows 10 including version 2004, ve...

Jun 12, 2020 Cyber Security

NHS email service fooled users in phishing attack

NHS Digital is contacting users of its NHSmail email system after a small number of mailboxes were compromised in a gene...

May 25, 2020 Cyber Security

Beware of security threats before deploying remote working

Remote working is receiving a great deal of attention recently for obvious reasons. The world has changed and remote wor...

Jun 09, 2020 Cyber Threats

Common types of cyber-attacks and how to avoid them

With cyber-attacks on the rise, businesses are constantly worried about losing vital data and the threat is very real. ...

May 19, 2020 IT Security News

EasyJet data breach: Over 9 million customers affected

The personal data of over 9 million EasyJet customers has been infiltrated by hackers, including over 2,000 users' credi...

Jun 12, 2020 IT Security News

100,000 cheap wireless cameras sold in the UK are vulnerable to hacking

Consumer advocacy organisation Which? has issued a warning over the security of wireless camera brands made by China-bas...

May 18, 2020 Cyber Security

UK power grid operator Elexon hit by cyberattack

The UK’s power grid middleman Elexon has announced it has fallen victim to a cyberattack, which did not compromise pow...

May 28, 2020 IT Security News

UK virus apps highlights tension between privacy and need for data

As more UK and European governments turn to tracing apps in the fight against the coronavirus, a deep-rooted tension bet...

Jun 09, 2020 IT Security News

Self-employed targeted by hackers with HMRC SMS phishing scam

Cyber criminals have launched a new phishing scam designed to steal personal and financial details of millions of self-e...

May 27, 2020 Cyber Security

UK scared cybercriminals will use NHSX Covid-19 Tracing App to launch attacks

Nearly half (48%) of the UK public surveyed about the NHSX COVID-19 tracing app do not trust the UK government to keep t...

Jun 08, 2020 Cyber Security

Ransomware attack compensation: What the UK public think

UK consumers believes businesses should stand their ground having suffered a ransomware attack and refuse to negotiate w...

May 28, 2020 IT Security News

Defence tips to stop a trojan invasion

Knowing not to open email attachments from unfamiliar addresses, or even the email itself, is a vital step to preventing...

Jun 11, 2020 IT Security News

UK government still can’t decide how NHS contact tracing app should work

A new report today says that the UK government still hasn’t decided exactly how its NHS contact tracing app should wor...

May 20, 2020 IT Security News

To VPN or not to VPN for business users

It’s a question many organisations are asking as they work to provide secure and reliable remote access at scale. ...

May 22, 2020 Cloud Security News

Overwhelming majority of UK organisations now confident in public cloud security

UK businesses are extremely confident in the security measures offered by public cloud service providers.

Jun 25, 2020 IT Security News

NCSC catch a million phish

The National Cyber Security Centre has received the millionth submission to its Suspicious Email Reporting Service. ...

Symantec Home 120x60