
List of cyber attack threat trends
    
    Encyclopedia
    
        A list of cyber attack threat trends is presented in the order of sophistication which generally corresponds to the chronology of computer network used between the 1990s and 2008.
- Internet social engineering attacks
 - Network sniffers
 - Packet spoofing
 - Session-hijacking
 - Cyber-threats & bullying (not illegal in all jurisdictions)
 - Automated probes and scans
 - GUI intrusion tools
 - Automated widespread attacks
 - Widespread, distributed denial-of-service attacks
 -  Industrial espionageIndustrial espionageIndustrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes...
 - Executable code attacks (against browsers)
 - Analysis of vulnerabilities in compiled software without source code
 - Widespread attacks on DNS infrastructure
 - Widespread attacks using NNTP to distribute attack
 - "Stealth" and other advanced scanning techniques
 -  Windows-based remote controllable trojans (Back OrificeBack OrificeBack Orifice is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a word play on Microsoft BackOffice Server software.Back Orifice was designed with...
) - Email propagation of malicious code
 - Wide-scale trojan distribution
 - Distributed attack tools
 - Targeting of specific users
 - Anti-forensic techniques
 - Wide-scale use of worms
 - Sophisticated botnet command and control attacks
 

