The Group
The companies of the group
Sustainability
Compliance
Investors
Media
Careers
Contacts
  • English
    • Italiano
    • Español
    • Portuguese
    • Français
Logo V-Valley
  • Dealers
  • Manufacturers
  • End users
  • V-Valley people
  • Cloud
  • Cyber Security
  • Cabling and Energy Efficiency
  • Infrastructure and data centre
  • Network infrastructure and connectivity
  • Software Defined and Data Management
  • Unified Communication & Collaboration
  • Video surveillance
  • Pre-sales technical support
  • Assembly
  • Spare parts
Vendor
LOGIN BECOME CUSTOMER
  • English - Bandiera English
    • Italian - Bandiera Italian
    • Spanish - Bandiera Spanish
    • Portuguese (Portugal) - Bandiera Portuguese (Portugal)
    • French - Bandiera French
Apri sottomenu Why V-Valley Espandi sottomenu
  • Dealers
  • Manufacturers
  • End users
  • V-Valley people
Apri sottomenu Solutions Espandi sottomenu
  • Cloud
  • Cyber Security
  • Cabling and Energy Efficiency
  • Infrastructure and data centre
  • Network infrastructure and connectivity
  • Software Defined and Data Management
  • Unified Communication & Collaboration
  • Video surveillance
Apri sottomenu Services Espandi sottomenu
  • Pre-sales technical support
  • Assembly
  • Spare parts
Vendor
The Group
The companies of the group
Sustainability
Compliance
Investors
Media
Careers
Contacts
LOGIN
BECOME CUSTOMER
Types of cyber attacks Types of cyber attacks

Types of cyber attacks

Home / Solutions / Cyber Security / Types of cyber attacks

immagine-mobile-cyberattacchi

CYBERCRIME

Targeted attacks on systems for financial gain or to cause business disruptions

immagine-mobile-cybercrime

CYBERATTACKS

More structured, large-scale attacks often aim to gather information for socio-political purposes

immagine-mobile-cyberterrorismo

CYBERTERRORISMO

Attacks on electronic systems to arouse panic and fear

AMONG THESE WE CAN FIND:

img-malware

MALWARE

Malware, is software created by cyber criminals or hackers for the purpose of damaging or causing a user's computer to malfunction, with the aim of financial gain.
It can be via e-mail attachments or downloads.

The main types of malware are:

  • Virus: is a programme that spreads throughout a computer system. With its ability to replicate itself, it attaches itself to a clean file, infecting it with its malicious code.
  • Trojan: is a type of malware disguised as legitimate software. It can cause damage or collect data.
  • Spyware: is a programme that secretly records. the user's actions and is often used to capture credit card data.
  • Ransomware: malware that blocks access to files and data, and is then released upon payment of a ransom.

PHISHING

An attack by sending e-mails that appear to come from secure sources, requesting sensitive information. Phishing attacks usually aim to induce users to provide credit card data or other personal information. They can also be sent via social or instant messaging programmes.

img-phishing
img-man-in-the-middle

MAN-IN-THE-MIDDLE

This is a cyber threat based on the interception of communications between two people for the purpose of stealing data. For example, on an unsecured Wi-Fi network.

DENIAL OF SERVICE

By overloading networks and servers with excessive traffic, cyber criminals prevent a computer system from fulfilling legitimate requests. This renders the system unusable.

img-denial-of-service

USEFUL TIPS TO PROTECT YOURSELF AGAINST CYBER ATTACKS

  • Update your software and operating system
  • Use antivirus software
  • Use complex passwords and change them periodically
  • Do not open e-mail attachments from unknown senders and do not click on links in e-mail messages whose origin you are not sure of
  • Avoid using unsecured Wi-Fi networks
CONTACT US

PREVENT ATTACKS, INTERVENE IN TIME: CONTACT US TO FIND OUT HOW WE CAN HELP YOU!

Dear User, we inform you that by submitting such form we would like to collect your personal data to get in contact with you regarding the interest you showed. You will be reached out by a specialist of the companies V-Valley S.r.l. (Data Controller) through phone and/or e-mail. Your data won’t be disclosed to third parties either won’t be subject to any release, they will be stored by V-Valley S.r.l. for a maximum period of 12 months, without prejudice to possible ask for their deletion before such deadline.
You can always reach V-Valley S.r.l. for any further clarification by writing to the e-mail address [email protected]
For further information regarding the personal data processing carried out by V-Valley S.r.l., please consult the Privacy Policy.

reCAPTCHA is required.

ARE YOU INTERESTED IN V-VALLEY SOLUTIONS AND SERVICES?

Contact us to receive personalized advice based on your needs.

Request information
Logo V-Valley
Follow us:

Business

Why V-Valley V-Valley people Careers Contacts

Do business with us

Conditions of purchase Conditions of sale Code of ethics ISO Certifications

Our solutions

Cloud Cyber Security Cabling and Energy Efficiency Infrastructure and data centre Network infrastructure and connectivity Software Defined and Data Management Unified Communication & Collaboration Video surveillance

Our services

Pre-sales technical support Assembly Spare parts
Logo V-Valley

Business

  • Why V-Valley
  • V-Valley people
  • Careers
  • Contacts

Do business with us

  • Conditions of purchase
  • Conditions of sale
  • Code of ethics
  • ISO Certifications

Our solutions

  • Cloud
  • Cyber Security
  • Cabling and Energy Efficiency
  • Infrastructure and data centre
  • Network infrastructure and connectivity
  • Software Defined and Data Management
  • Unified Communication & Collaboration
  • Video surveillance

Our services

  • Pre-sales technical support
  • Assembly
  • Spare parts
Follow us:
V-Valley S.r.l. single shareholder company - via Energy Park 20, 20871 Vimercate (MB) - Italia
Subject to management and coordination by Esprinet S.p.A.
Tax Code and No. Company Register Milano, Monza Brianza, Lodi 07064570968 | R.E.A. MB-1872131
Fully Paid-up Share Capital € 20.000,00
Privacy Policy Cookie Policy Modify Consent