This is a malicious software that takes over or takes away your website and demands some payment to be made so that you can recover your site.This is a very dangerous software because it will affect your reputation there by loosing customers.
You are also not guarenteed that your website will be restored after making the payment.Thats why at uxtcloud we offer site protections that will protect your site from viruses and help you restore your website incase its brought down by viruses.You can view different packages here.
This is a malicious software that may bring down your website or change the look and functionality of your website.This may cause loses in your company because your website is supposed to be available to visitors 24/7.
3.Accidental file deletion.
This may be done by your staff or yourself . This can bring down the whole website especially if its a downloadable file or a database connection file.
Phishing is sending of unsolicited fake emails to a companies customers pretending to be the original emails.This is so dangerous because it may collect your customers information which is confedential to the company.
The emails might also contain dangerous links which when clicked they lead to a bad website or install viruses in the users device.
This is when your web system has been attacked by malicious agents and steal you customers data.
Example of this is when Yahoo user accounts were compromised in 2016.Around 1 billion user accounts were compromised.
This software challenges the login credentials to gain access to the system especially remotely accessed systems.Once it has accessed the system it may deny access to the system by owners or delete files and data.Example of this is Wannacry which demanded ransom so that users can gain access to their files.
This is caused by bots by flooding the bandwidth of a targeted web server therefore denying valid visitors from viewing the website.
8.Cross Site Scripting.
This is a common software that inserts a malicious code into a vulnarable web application.This code usually targets the users of the system therefore the system may continue working properly.
This attack relies on SQL code to manipulate the database.The attacker may steal the companies data or give himself access rights to the system then perform a malicious action.He may even delete some files in the system.This attack happened in 2017 on WordPress and Hetzner South Africa where almost 145 million records were compromised.
10.Cross Site Request Forgery.
This attack deceives the users browser by riding sessions that trick the application that the user is logged in.This may enable the attacker to steal financials records and user password.