The classic CV template: how does it differ from the modern one and which is better?

The classic CV template shows you what the document looks like and what it should contain. It will also show you how it differs from a modern one, so you can find out which alternative is more suitable for you. We’ve put together basic information on each type of CV, along with samples and practical advice that will help you when you’re looking for a new job.

What is a classic CV?

The classic CV is the most common type of document you will come across. It is characterised by clarity, formality and simplicity. It only briefly lists information about you and your experience, rarely going into detail. Therefore, it is often accompanied by a cover or motivation letter in which you can elaborate on your qualities and experience.

Other features of the classic CV include its minimalist design. It is usually a white document with black font. You can use italics or bold to highlight certain sections or information. Alternatively, you can enlarge some words, but you shouldn’t use fancy fonts or different colours.

Sample of a classic CV

In order to make the classic CV easy to read and to prevent the information from blending together, it is divided into several basic parts:

  • Personal details – this includes your name, surname, address, phone number and email so that the prospective employer knows who the CV belongs to and can contact you if they are interested. Check this information carefully before sending the document.
  • Work experience – this section is for you to list all your previous jobs, in reverse chronological order. This means that you list your most recent job first. Each work experience should include the name of the company that employed you, your position, the length of time you were employed, and a brief description of your main responsibilities and functions. Remember that a traditional resume is meant to be rather brief, so include information in bullet points, not in long sentences and paragraphs. If you want to say more about the position, use a cover letter or mention the information at the interview.
  • Education – as well as work experience, education is listed in reverse chronological order. If you have a college degree, you list that first, followed by high school. Add the years of study and the degree earned to each item.
  • Skills – this section focuses on technical or personal skills such as computer skills, foreign languages, team leadership skills, etc. Only include skills that are relevant to the job and that you could use on your CV.
  • Hobbies and interests – this is an optional section that will give a potential employer a better insight into your personality. For example, you can list sporting activities, creative activities, volunteering, additional education (courses, workshops) or travel.
  • Other sections – if you need to, you can add other sections to your CV such as references, awards, certificates, etc. However, the more information you provide to a potential employer the better, but all information must be relevant. Avoid unnecessary details. Keep your CV short and to the point rather than full of irrelevant details.
Recommend
We recommend:

As most CVs are now electronic, you can add links to your website or LinkedIn profile where potential employers can find more information. For tips on how to fill out your LinkedIn profile correctly, see our article What is a LinkedIn profile?

Sample of a classic CV

sample of a classic CV

Advantages and disadvantages of a classic CV

The classic CV has several advantages and disadvantages that you should know about before you decide to use it.

Advantages of a classic CV

  • Clarity and simplicity – a classic CV is clear, making it very easy for a potential employer to find key information such as skills, work experience and so on.
  • Versatility – you can use this type of CV in almost any industry. Plus, if you’re sending it to multiple companies, it’s easy to edit because the information is listed in bullet points, not long paragraphs.
  • Easy to create – unlike a modern CV, you’ll have a classic one ready very quickly. However, take your time when writing it out and make sure all the information is correct.
  • Formality and professionalism – a classic CV looks professional, so it will represent you well.

Disadvantages of a classic CV

  • Lack of creativity – if you’re a creative person, the classic CV can limit you because it’s so simple and concise.
  • Less space for details – a traditional CV usually only includes the most important information. If you want to provide more detail, you’ll also need to attach a cover letter or send your portfolio.

When to choose a classic CV?

The classic type of CV should be chosen especially when:

  • you pride yourself on professionalism and formality,
  • you’re applying for a job in a traditional and conservative sector such as law, banking, government or academia,
  • you also send a cover letter or portfolio where the potential employer can find additional information,
  • you need to create a CV quickly and easily.

What is a modern CV?

A modern CV is a creative type of document that often uses a variety of graphic elements that can easily set you apart from other applicants. Another advantage of a modern CV is that, unlike a traditional CV, it contains detailed information about you, your experience, skills and hobbies, so there’s often no need to attach a cover letter or other supporting documents.

This type of CV is most often used in dynamic and creative fields where you need to stand out on first contact. It’s more difficult to prepare, but if you put the effort in, it can help you land your dream position.

Recommend
We recommend:

Although modern CVs allow for creativity, don’t go overboard. A document that is overly complicated, colourful or cluttered may not make a good impression on a potential employer.

Sample of a modern CV

A modern CV should have the same sections as a classic CV, namely:

  • personal data,
  • work experience,
  • Education,
  • skills and hobbies,
  • Interests,
  • other optional sections.

Don’t be be afraid to go in-depth when filling in your details. Write longer sentences and paragraphs, introduce projects you’ve worked on, courses you’ve taken, etc. Avoid being brief and short bullet points of information.

Sample of a modern CV

The modern CV includes the same sections as the classic

Advantages and disadvantages of the modern CV

Even a modern CV has its advantages and disadvantages:

Benefits of a modern CV

  • Creative and visually appealing design – a modern CV uses colours, graphs and other visual elements that can catch the employer’s eye and increase your chances of success.
  • Detailed information – you can include much more information in a modern CV than in a traditional one, which increases your chances of landing your dream job. There’s also the advantage that you often don’t need to attach a cover letter to a detailed CV.
  • Differentiation – you can customise your modern CV with different fonts and visuals to help you stand out from the crowd.
  • Flexibility of format – you can customize and organize the individual sections of your CV exactly as you like. They are not fixed as in a traditional CV.

Disadvantages of the modern CV

  • Less clarity – by being full of information, a CV can be less clear than a traditional CV. Therefore, make sure that the different sections are properly separated, for example by a heading in a larger or bold font.
  • Requires more time to prepare – it takes a lot of time to develop a modern CV. Set aside two or three hours, think about how it should look and write down all the necessary details.

When is a modern CV suitable?

A modern CV is suitable when:

  • you’re applying for a job in a creative industry such as marketing, design or the arts,
  • you want to impress and stand out,
  • you want to include details of your skills and experience on your CV.

Tips when choosing a CV

Once you have an idea of what a classic and modern CV looks like, you can move on to choosing one and then creating it. If you still don’t know which is best for you, answer the following questions:

  • What industry do you work in? If it’s marketing, art, fashion or advertising, a modern resume is the best choice. On the other hand, if you work in finance, banking or government, opt for a formal, or classic, CV.
  • What type of CV does the employer require? In some job adverts, you may find information about what kind of CV the employer requires. This will tell you whether a traditional or modern CV is more appropriate.
  • How do you want to present yourself? If you want to give the employer as much information as possible right from the start, choose the modern type. On the other hand, if you want to reveal more about yourself in a cover letter or interview, choose a brief, formal CV.
  • Are you sending just a CV or also a cover letter or portfolio? If you’re just sending a CV, the modern type is usually better because it contains more information. If you are also attaching a cover letter or portfolio, keep the CV short so that the information is not unnecessarily repetitive.

More practical advice on how to write a CV

Follow these tips when creating your CV:

  • The information on your CV must be accurate and truthful. Do not make anything up. Any lies will be exposed later and may cause you problems.
  • Be brief and to the point. Even a modern CV, which is more detailed than a traditional one, should not be 4 or 5 pages long.
  • Use the same style and formatting. Don’t change the font type or size to avoid chaos in the document.
  • You can add links to your portfolio or social networks such as LinkedIn to your online CV.
  • When writing, focus on the skills that are relevant to the position.
  • Avoid giving personal information that is not relevant. Focus primarily on skills and experience.

A classic and modern CV template to make your job search easier

Writing and sending out CVs is time-consuming. If you don’t want to start from scratch, try pre-made templates on the internet. The classic CV template is simple and can be completed in a few minutes. A modern CV template , on the other hand, gives you some idea of what it might look like, but doesn’t limit you in any way. It’s up to you how you customize it. Use our practical tips to impress your potential employer on first contact.

A sample reference letter from employer: how and when to include a job reference on a resume?

A reference sample from an employer can greatly help you in your job search. It will help you know what this type of output should look like, what should be in it and, conversely, what should definitely not be in it. In addition, we’ve prepared practical tips and advice in this article to help you avoid unnecessary mistakes and know who to ask for references.

What are references?

A reference (also a letter of recommendation) is an informal personal recommendation given to you, as a job applicant, by your former employers, clients or business partners. They are usually a summary of information about your work experience, skills, abilities and personal qualities that will help a potential employer to build a better picture of you and determine whether you are a suitable candidate for the job. A reference includes achievements you have made in a previous job or specific examples of how you have used your strengths. The person writing the reference may mention how well you solve problems, how you work in a team or how you bring interesting ideas to the table. Employer references usually include contact details of the writer so that the new employer can check the accuracy of the information or ask for further details. However, the contacting happens only in the last rounds of the recruitment process, when there are only a few candidates for the chosen job.

Recommend
We recommend:

References should always be truthful and up to date. You should also be able to explain why you have chosen this person to recommend you. In this case, it would be useful to mention that they taught you a lot in a previous job, for example, or that they are a role model for you. However, you should avoid mentioning personal friendships. A close friend or family member is not an ideal referee.

Reference types

Job recommendations can be divided into several types according to their form, formality, purpose and how they are delivered:

Written vs verbal recommendation

According to the form of the recommendation we distinguish:

  • Written form – a letter of recommendation or job evaluation from a previous employer describing the employee’s performance evaluation. They may be attached to a resume or requested by a new employer.
  • Verbal – a recommendation given in person or over the phone, e.g. by providing a phone number on a CV or cover letter (with the referee’s permission, of course). These are less formal and more flexible as the referee can respond to questions spontaneously.

Personal vs work references

Based on who writes and provides the recommendation, there are two basic types:

  • Personal references – written by your colleagues, or people who have worked with you but were not your supervisors, or people who otherwise supervised your performance such as teachers, coaches, mentors, etc. They focus mainly on personal qualities such as teamwork, relationship skills, communication skills or character.
  • Work references – these are references from an employer, client, business partner or someone who has been your supervisor in the past. These tend to include skills related to work ethic, meeting deadlines, team leadership or work performance.

Feel free to combine the references. However, it is the work references that are most relevant for a future employer.

On request vs proactively

Referees may provide their recommendations:

  • On request – that is, if you or your new employer asks them to do so.
  • Proactively – this is an initiative to provide a recommendation of the referee’s own volition, e.g. via the LinkedIn platform in the Recommendations section.

Work assessment vs reference

However, we can still look at references from former employers from an employment and formal point of view. In this division, we know two types of documents:

  • Work assessment – employer is required to provide this document at the employee’s request upon termination of employment. It is therefore a formal and regulated document governed by the Labour Code. Its exact form and content are not specified by the law. However, it should be an objective assessment of the former employee’s work. Together with the work assessment, an employment certificate is issued.
  • Employer reference – this is more of an informal, voluntary and may even be just a verbal (e.g. a phone call between employers) and subjective recommendation that an employer provides to an employee for their future employer.

However, both documents are important when looking for a new job because they tell about the employee’s work history and performance from the perspective of another manager.

Obligation to issue a work assessment and employment certificate

The employer is obliged, in accordance with the provision of § 75 paragraph 1 of the Slovak Labour Code, to issue a work assessment to the employee within 15 days of the employee’s request. The employee can request a work assessment at any time during the employment relationship. However, the employer is not obliged to issue a work assessment earlier than two months before the end of the employment relationship. The law defines a work assessment as: “all documents related to the evaluation of the employee’s work, his qualifications, abilities, and other facts related to the performance of work.” The employee has the right to inspect their personal file and make extracts, copies, and photocopies from it. However, the form, method of issuance, and content of the work assessment are not specified. The employer is also obliged to issue a certificate of employment to the employee upon termination of the employment relationship and to include in it:

  • the duration of the employment relationship,
  • the type of work carried out,
  • whether deductions are to be made from the employee’s wages, in whose favour, in what amount and in what order is the claim for which the deductions are to be made,
  • an indication of the employee’s commitment to remain in the employer’s employment for a specified period of time after passing the final examination, A-levels or graduation examination referred to in section 53(2), including an indication of when that period of time will end,
  • an indication of the provision of severance pay under section 76a; if severance pay has been paid retrospectively, the employer shall issue a new employment certificate to the employee.

However, if the employee disagrees with the work assessment or work certificate – and the employer has not modified or supplemented the assessment at the employee’s request – they may apply to the court for a reasonable modification of the assessment within 3 months from the date on which the employee became aware of the contents of the document. In such a case, the employer is obliged to modify the document. As regards other information about the employee, apart from the above, the employer is only entitled to provide this information with the employee’s consent.

LinkedIn references – online public evaluation of employees, employers, colleagues or business partners

References on the social network LinkedIn are a separate reference category. You can get these digital recommendations from your contacts – superiors, subordinates or clients. They have several advantages:

  • They are publicly available – LinkedIn references are available to anyone who visits your profile. People who wouldn’t otherwise have access to this information can read about your strengths.
  • Anyone can give them – anyone can give you a rating for your work on LinkedIn, from your colleagues and clients to your business partners and bosses.
  • Easy to fill – the LinkedIn reference template doesn’t have the same strict rules as regular references. All you have to do is write what you think the person’s strengths are and post the text.
  • You can have more of them on your profile – there’s no limit to the number of references you can have on LinkedIn. So you can accumulate dozens of them over the course of your career.
  • They are authentic – each reference includes the author’s name and a link to their profile. This makes it easy for a potential employer to see what position the person holds, what area they work in, etc.
  • They support your professionalism – LinkedIn references are just as important as traditional ones. They can confirm that you’re really good at what you do and have the skills you need.

Linked in referrals are digital recommendations you can get from your contacts

LinkedIn references - online public evaluation of employees, employers, colleagues or business partners

Why are references important? It’s not just about employee evaluation

References are important for several reasons. The main ones include:

  • Verifying your skills and experience – references help potential employers verify that the skills, abilities and work experience you’ve listed on your CV or cover letter are genuine.
  • Credibility – a well-crafted reference from your previous employer increases your credibility and gives you some confidence that you will be a good addition to the team.
  • A better view of your personality – a CV often just lists your strengths, skills and experience, but a well-written reference can show where and how you’ve used them. Thus, testimonials contain not only employee evaluations but also specific work results. A new employer will have a better idea of how you can lead a team, handle stressful situations or solve problems.
  • Comparing candidates more thoroughly – it is often the case in a selection process that some candidates have the same or similar skills. In order to decide which one is better, the employer often looks at references. These can reveal a lot of details about you, such as your performance ratings during crisis situations or your working behaviour in a team, e.g. towards colleagues or clients, and help you get your dream job.
  • Encouraging networking – this point is especially true in connection with references on LinkedIn. Good references can help you build valuable professional relationships and build your personal brand.

Where to put references?

You can provide references in a number of different ways, depending on what area you work in or who you’re applying to. Most often, they are included in the following documents:

  • CV – references should be listed in a separate section, which you label “References” or “Testimonials”. The advantage of this solution is that the employer has all the information in one document and does not have to click anywhere. On the other hand, a CV only provides limited space, so longer references are better put separately, for example in an attachment.
  • CV attachment – ideal if you have a longer reference or don’t want your CV to be several pages long. The attachment should be sent in PDF or Word format.
  • Portfolio/website – if you include your portfolio or website on your CV, you can include references here. The advantage is that they are authentic, as you can link directly to the employer’s website or a colleague’s LinkedIn profile, and they are easy to update.
  • Cover letter – you can include references in your cover letter. In this case, just briefly mention a recommendation from a supervisor or colleague. However, bear in mind that this is not common practice – references are more likely to appear on a CV or website.

When to include references on a CV?

You should include references in your CV in the following situations:

  • if a potential employer asks for it, for example by stating it in the advertisement,
  • if you already have some references and you think they could help you get your dream job,
  • if you want to impress your employer,
  • if you want your CV to be more credible,
  • if you have a vacancy on your CV and you want to fill it.

When not to provide references?

References are great and can help you, but they may not always be useful. For example:

  • you’re just starting out and you don’t have good references,
  • you don’t have a relevant reference from your employer,
  • the company does not require references at an early stage of the selection process,
  • references make a CV too long.
Recommend
We recommend:

References can help you, but don’t overdo it. Two or three good references are usually enough for an employer.

Who to ask for a reference?

Who you should ask for a recommendation depends primarily on whether you are a university student, a recent graduate or an experienced professional in the field.

  • If you are a student or recent graduate, ask for references from, for example, a teacher, professor, coach or part-time employer.
  • If you are an experienced professional in the field, a reference can be provided by a previous employer, supervisor or mentor.

Who definitely not to ask for a job reference?

You should never ask for references:

  • family members or very good and close friends who cannot be objective,
  • colleagues and superiors with whom you had some conflicts,
  • people who don’t know you well,
  • people who aren’t interested in providing a reference and you have to force them.

How to ask for a job reference?

If you want to ask someone for a reference, you should do so professionally and respectfully. The best way to do this is to follow this procedure:

  1. Choose the right person(s) – only ask for references from people who are relevant to you. A reference from someone who works in a completely different field will not be beneficial to a potential employer.
  2. Choose an appropriate method of communication – the best way to ask for a reference is a face-to-face meeting, email or phone call. Avoid contacting via social media as this comes across as unprofessional.
  3. Phrase your request – your request should be brief, concise and polite. Get straight to the point and remember to be polite. Explain thoroughly to the person what you need the reference for.
  4. Have patience – never get references at the last minute. Give the person who has to write it plenty of time. If they turn you down, respect their decision and don’t pressure them.
  5. Thank them for their helpfulness – whether or not the person has written you a reference, always thank them for their response.

Sample references and tips on how to include them in your CV

Employee reference evaluations do not have a precise template of what they should look like. However, they should include the following information:

  • the name of the person writing the reference,
  • the job the person holds,
  • the contact details of the person,
  • the text of the recommendation itself (strengths, skills, abilities, examples of specific achievements).

To make it easier to write references, we have prepared a handy sample of employer references. Download the Modern CV Samples – References.pdf.

How to write an employee evaluation from the perspective of an employer, manager, or colleague?

When a manager or colleague writes a reference for a former subordinate or colleague, they should follow a few basic rules to ensure that the reference is not only professional but also useful to the prospective employer. Here are a few recommendations:

  1. Introduction and context – the first part should briefly introduce your job position and relationship with the employee or colleague. This includes information about in what capacity you have worked with them, how long and in what context. Example:

“I worked with Jan Procesny during his five-year tenure in our company as a project manager. As his supervisor, I can attest to his high work commitment and professional approach in every area of his work.”

  1. Job skills and performance – this section should detail the job skills and qualities that the employee has achieved in this position. Try to be specific and provide examples that demonstrate the skills in question. You can include hardskills such as technical skills with various software, professional certifications, or language skills. Example:

“Jan has exceptional technical skills, particularly in project management and working with software tools such as Jira and Asana. In addition, he has an advanced level in Microsoft Excel and has frequently used advanced features such as contingency tables and macros to analyze and visualize data. Jan is also fluent in English and has a working knowledge of German, which has enabled him to work effectively with international clients.”

  1. Work ethic and personal qualities – in addition to professional skills, it is important to include the employee’s work ethic and personal qualities. Here you can list softskills such as punctuality, responsibility, flexibility or problem-solving skills. Example:

“Jan is characterized by excellent organizational skills, which was especially evident when managing complex projects with a large scope. Thanks to his attention to detail, we were able to meet challenging deadlines while ensuring high quality results. He was also an active team member, always willing to help his colleagues. Jan is very reliable and always came with a positive attitude, even in stressful situations. He has exceptional communication skills that allow him to communicate effectively with different teams and solve problems quickly and independently.”

  1. Final Recommendation – in the final section, make it clear whether you would recommend the person for the next position. Be positive and concise. You can also indicate in what areas you think they would be best suited. Example:

“Based on our cooperation, I am convinced that Jan Procesny will be an asset to any company looking for an experienced project manager with strong organizational skills and an eye for detail. I have no hesitation in recommending him.”

  1. Contact details – please provide your contact details at the end so that the new employer can verify the information or get more details if necessary.

A reference structured in this way is clear, positive and offers practical information that will help a prospective employer in their decision-making process.

Which work testimonials and references are correct?

Proper job references on a resume meet these parameters:

  1. They are written by a former employer, mentor, client, business partner, professor, teacher, or other person who has worked with you in the past.
  2. They can be verified by phone call or email.
  3. They shall contain all the particulars, including the name, surname and contact details of the person concerned.
  4. They inform you about relevant facts, i.e. your skills and abilities.
  5. They tend to be short and concise, not written in half a page or more.
  6. They are up-to-date, truthful, objective and positive.

Sample reference – ask for feedback and get the employer’s attention

A good reference should be written by someone who has worked with you longer and knows you
The reference should also include the contact information of the person writing it

An employer reference template is a practical solution if you want to make writing a reference and finding a job easier. Remember, however, that an employer reference is not the only type of document that needs to be of good quality and well crafted. In addition to it, you will need a detailed CV and, if the employer requires it, a cover letter in which you can elaborate on your experience and skills.

Year 2000 problem and 9 major events in IT at the turn of the millennium

The year 2000 was a groundbreaking year for the IT sector and brought a series of events that laid the foundations for the digital world as we know it today. In this article, we look at ten pivotal moments that not only shaped the technology industry, but also the way we use technology in our everyday lives. These milestones are often nostalgic memories today, but they also remind us how far we’ve come in a quarter of a century.

1. Year 2000 bug – the Y2K problem that tested the IT world

The early 2000s were accompanied by nervousness in the IT sector. Older IT systems, which recorded years in only two digits (e.g. 99 instead of 1999), could interpret the year 2000 as 1900 as the new millennium dawned, which could lead to failures and errors in various system settings. Banking operations, patient records or aviation systems could be in chaos. This problem is also known as the Y2K problem.

Companies and governments have invested significant sums to modify and test software and ensure that they avoid outages. While no major disaster has taken place, Y2K has reminded us of the importance of IT security, testing and constant upgrading of systems.

Did you know that…

Did you know that? It is estimated that up to $300 billion was spent globally on systems modifications in the context of the Y2K solution.

2. Dot-com bubble – the boom that transformed the digital market

The year 2000 was also the peak of the dot-com bubble, when internet companies enjoyed huge investments, with the assumption that online business would be revolutionary. Shares in internet companies grew at a dizzying pace, but the bubble soon burst and many start-up online companies found themselves in financial trouble or disappeared altogether.

Despite the collapse of the dot-com bubble, it changed the market. New business models were born and technology giants like Google, Amazon and eBay shaped the future development of the digital economy. This collapse taught many investors to be more cautious with their investments.

Did you know that…

Did you know that? During the dot-com bubble, Amazon lost up to 90% of its value, but Jeff Bezos decided to stay with the company and lay the foundations for its future success.

3. The USB standard – the end of the floppy disk era and a breakthrough in data transfer

USB 1.1 became the new standard for connecting devices and transferring data in 2000. Thanks to USB, we were able to transfer data between devices quickly and easily. USB sticks, which offered a capacity of around 8 MB, gradually began to replace floppy disks, which could only hold a few documents.

Today, we can’t imagine a work or home environment without USB ports. This standard has started the transition to more modern storage devices and devices that use a USB port for their communication with the computer, such as modern mice or keyboards.

Did you know that…

Did you know that? The first USB sticks had a capacity of just 8 MB, which is now only a fraction of the size of an average smartphone photo. Nowadays, USB sticks typically have a capacity of 1 TB — more than 100,000 times greater than the original models.

4. The first mobile phone with a camera – starting mobile photography

The year 2000 also brought the first mobile phone with a camera – the Sharp J-SH04, available on the Japanese market. The camera resolution was only 0.1 megapixels, but it allowed users to capture moments they could take with them.

Mobile photography has become a revolution. Today, mobile cameras are a key feature of every smartphone and allow us to not only store memories, but also create content that can be instantly shared on social networks. This was the beginning of the digital era of capturing life’s moments.

Since 2000, mobile photography has evolved to the point where many professional photographers are using smartphones instead of traditional cameras.

Did you know that…

Did you know that? The Xiaomi 12T Pro boasted a 200-megapixel sensor and was named the phone with the best camera in October 2022.

5. Dial-up connection – the beginning of internet access for the masses

For most users in 2000, the Internet was available via dial-up connections, which had speeds of only 56 kbps. Although slow and often unstable, dial-up connections brought the Internet into homes. Dial-up was the foundation of mass access to the Internet and provided an early entry into the digital world for many users.

Did you know that…

Did you know that? The sound of a dial-up modem has become iconic and, for many, is a nostalgic symbol of the early days of the internet. This connection signal actually represented a negotiation process between the modem and the ISP to determine the optimal connection speed.

6. The advent of Windows 2000 – stability and security for the enterprise

In 2000, Microsoft introduced Windows 2000, an operating system that brought reliability, stability, and enhanced security to enterprise environments. This system was crucial for many businesses because it improved stability over previous versions.

Windows 2000 became a popular operating system, especially in corporate environments, where it was the basis for many workstations and servers. It became the new standard and also raised the security bar.

Did you know that…

Did you know that? Although Windows 2000 did not completely eliminate the ‘blue screen of death’ (BSOD), it was the first Microsoft operating system that did not have it as a common problem. The system incorporated numerous enhancements that greatly improved its stability.

7. PlayStation 2 launch – taking the games industry to a new level

PlayStation 2 was a big event in the gaming industry in 2000 and quickly became the best-selling games console of all time. With revolutionary 3D graphics and gaming capabilities, it brought new experiences and entertainment to living rooms.

Did you know that…

Did you know that? The PS2 was so popular that it continued to sell until 2013, 13 years after its release. Furthermore, with over 155 million units sold, it is the best-selling games console in history.

8. Increase in emails – email as the main communication channel

The year 2000 brought an increase in the use of e-mail. Platforms such as Hotmail and Yahoo! Mail saw millions of new users and email became one of the main means of communication. In addition to business communication, email has become a popular tool in the private sphere as well.

Emails have not only made global communication easier, but have also changed the way businesses operate, which could rely on fast and efficient information. This development was the beginning of online communication as we know it today in its many forms.

Did you know that…

Did you know that? Founded in 1996, Hotmail was one of the first popular email services. Microsoft bought it the following year for $400 million, by which time it already had 8.5 million users.

9. The emergence of the Wi-Fi standard – the advent of wireless connectivity

Wi-Fi technology, which allowed cable-free connectivity at speeds of up to 11 Mbps, became commercially available in 2000. Wi-Fi enabled wireless access to the Internet, opening up new possibilities for both home and public connectivity.

Thanks to Wi-Fi, we were able to get rid of cables, which greatly increased the flexibility and accessibility of the Internet. Today, Wi-Fi is a common feature in offices, homes and public spaces.

Did you know that…

Did you know that? The term ‘Wi-Fi’ has no technical meaning; it is a marketing name invented by the Wi-Fi Alliance to make wireless connectivity easier for people to remember.

10. Google and its advertising model – the beginning of digital marketing

In 2000, Google introduced a model for advertising in search results known as AdWords. This model allowed businesses to target ads to specific users based on their search history and ushered in the era of modern digital marketing.

AdWords has transformed online advertising and enabled businesses to reach their target audience effectively. This method became the foundation of online advertising, which still makes up a major part of many digital platforms’ revenue today.

Did you know that…

Did you know that? Initially, the price per click on Google AdWords was just a few cents. Nowadays, highly competitive keywords can cost hundreds of dollars per click.

Conclusion

The year 2000 was definitely an interesting milestone for the IT world and laid the foundations that many of us take for granted today. A number of technologies that emerged during this period continue to influence the way we live and work. This article was intended to remind us how far the IT world has come in the last 25 years, and how we are constantly moving forward technologically.

Podcast #2: AI and the future of IT work

In the second episode of the podcast Na Vlne Kodu, we welcome Michal Bystricky, who works as a data scientist at msg life Slovakia. He will tell us how he uses artificial intelligence in his work and how AI will affect the work of IT specialists in the future. We wish you a pleasant listening and reading.

Welcome to today’s Na Vlne Kodu podcast, brought to you by msg life Slovakia. In today’s episode we have prepared for you the topic of AI and the future of IT work. We’ll take a look at how artificial intelligence is changing the world of work, not just in IT, but in general. Our guest is Michal Bystricky, who is a great visionary and among other things, is involved in artificial intelligence (read also our article about what is artificial intelligence). Together, we’ll walk through how robots will interfere with our careers and maybe even our lunch breaks.

Na Vlne Kodu Podcast (in English “On the Wave of Code” podcast)

Podcast “Na Vlne Kodu”

‘Na Vlne Kodu’ (On the Wave of Code) is an IT podcast by msg life Slovakia. It regularly covers topics from the fields of psychology and HR, as well as IT news. Listen to more episodes of Na Vlne Kodu.

Michal, please introduce yourself.

Hello everyone, my name is Michal and I’ll take the opportunity to be introduced by AI. Hi, are you there?

“Hey, sure, I’m here. How can I help you?”

I’m in the podcast right now. Could you introduce me? Please try to introduce me in a way that’s emotional, with enthusiasm. And when you talk about programming, please be sad or breathless.

“Okay, let me try. This is Michal. A man with tremendous determination and passion for technology. He takes a deep breath. His journey has been fraught with obstacles, but he has never stopped believing in the power of artificial intelligence. He begins to speak sadly. And though he sometimes loses hope when programming, his belief in the positive impact of technology always drives him forward. It’s as if he’s out of breath.”

Okay, wait. Now tell me where I work and what I do, please.

“Michal works at msg as a data scientist. He is developing a system for searching large amounts of documents that can answer queries based on their content. With extensive experience in various roles including teacher, system administrator, developer and development manager, he decided to return to development after major events in the AI field.”

Okay, I’ll try to add a little bit more. I decided to go back to development precisely because for the first time ever we can have a whole robotics team working for us.

What’s the most specific thing you’ve managed to find so far? And have you always managed to find what you wanted?

These are those magical moments when we have multiple documents – for example, a technical manual, a sales report or a marketing document and each of them is thousands of pages long. In that document, we can find the one piece of information we need. And we can also find related information in all the documents, link them all together, reference them, and then provide a comprehensive answer.

How would you explain the concept of AI to someone who “is stuck” in the 80s – such as myself at times?

If you’re stuck in the 80s, you know that a computer is made up of transistors. They’re like those switches 0 or 1. You can make block of logic out of them, which is what a computer is actually made of. At that time, a personal computer was made up of about 10,000 transistors. We have managed to increase that number very much, by 2 to 3 million more. Just to give you an idea – for example, a graphics card in a computer has 76 billion transistors. Then we built thousands of these very powerful computers side by side and took text from all over the Internet. We then created a statistical system – programmers might be familiar with regression – and we told it to predict the next word. Well, then it started to make sense. Later, we made the system even bigger, and the AI started thinking.

AI and robots – are they basically the kind of future colleagues who never take holidays?

Those AI colleagues are no longer future, they are present. Up to 70% of my work is done by AI. That 30% is my work because I know the context better and have expertise that I’ve gained over decades. The core of my work is programming, but I don’t write much of that code anymore, I actually just query the AI. Besides, I’m learning Spanish with the AI too.

“Artificial intelligence does 70% of my work. Personally, I don’t write much code anymore, I actually just query the AI.”

But if we’re talking about humanoids, i.e. robots that have arms and legs and talk, we’re not there yet. The primary challenge in this area is how to scale that model down. For example, a language model that has 200 trillion parameters needs 120 GB of memory, which requires about 4-5 graphics cards. Each consumes approximately 350 W, 2 kW in non-stop operation. The price starts somewhere at 4 000 euros. And that’s just the language. Then you still need to talk, listen, move, etc. Humans are very efficient biological systems – you have your coffee and you’re ready to work. But the current robot models are very inefficient, they need a lot of energy.

AI can solve complicated problems in a very short moment. Does this mean more time for IT professionals to play games or further their education?

AI doesn’t bring more free time, but it allows us to solve routine tasks. We can focus more on, for example, architecting or strategizing, and we have the opportunity to build better systems. So today it’s more about how to use that free time to do other work.

‘AI enables us to automate routine tasks. This means we can use our free time to develop better systems.’

Do you see the future of IT professionals as AI-tuning engineers or as someone who will collect data for artificial intelligence?

One option that one can apply are those big generic models like chatGPT, timeGPT and others. These biggest ones, called foundation models, are being developed in America. I’d like to zoom in on why this is so far away from us – ordinary engineers. OpenAI has 100 thousand H100 graphics cards on which it trains. One graphics card costs EUR 30 000, so those graphics cards alone cost EUR 3 billion, and there is also all the infrastructure around that. So you need a lot of money for the current AIs. We, ordinary engineers, will be more concerned with operating or maintaining these machines.

If artificial intelligence can write code, can we make do with IT testers? Or will it be developers who will continually educate and improve AI?

There are many themes in maintenance or servicing, I would mention a few. For example, it can be that fine-tuning when we train a model for a specific use case. That’s where transfer learning happens, where we take a big model, add some layers to it, and then train just our layers. Then we can give that model various other ways of expressing itself in a customized way. Another big topic like that is prompt engineering – how we instruct that model to give us what we want. Another related thing is alignment – whether what that agent is doing is consistent with the social rules. There are programs like AutoGPT or OpenAI Swarm, that we use to create a team of agents that work for us. Nowadays it’s quite easy – you install Ollama in Python and write such agents in basic form in one day. The complexity, the variability in which the answer can be provided, is infinite. That’s where one will be able to apply oneself very well. And will therefore work together with AI.

Recommend
We recommend:

Read also: Artificial intelligence and programming: should you be worried about your job?

When you hear the term process automation, do you see boring, monotonous work or do you imagine a more sci-fi future full of lasers and robots?

Artificial intelligence and automation could lead to something similar to what we see in Star Trek. People there live in abundance, everyone’s basic needs are provided for. They are enabled by key technologies such as replicators that can create any object from anything. They eliminate scarcity, and therefore they don’t need money. They can extract energy from antimatter, so they have a lot of energy. And there are other technologies, for example, holodecks to simulate the environment. If we had such means, our view of the economy would change, because we would not be constrained by the scarcity of resources. The people in Star Trek are engaged in creative, innovative and community activities that make sense. Individuals don’t contribute to society for money, but for personal fulfilment, curiosity, and a desire to contribute to some common good. This idea is, however, rather utopian.

Do you think AI will be intelligent enough to penetrate even the deepest interiors of the human mind? What do you think about mind reading? I know we’ll cover this more in the next podcast because it’s such a wide topic, but for now, at least briefly.

I think so. There are two levels. If we’re talking on a normal human communication level, i.e. what tone I speak in, what facial expression I have and so on, the AI can already detect what emotion a person is having and react accordingly. If you then add the second level of penetrating thoughts, that’s really for a longer discussion. Do you know the Neuralink project? It is a device that is implanted in the brain and captures signals from the brain that go to the AI. The AI learns what those signals mean and the human can control the devices by thinking. Neuralink is already being tested on humans and it works.

You mentioned that AI has the ability to read our emotions. Do you think we should be afraid of AI in the future?

I don’t think so. AI brings us a lot of improvements, and it’s because of them that we can better focus on the goal and do what we really want to do. People are scared of change, but I think the change will be positive.

If AI can write code, does it make sense for programmers to still learn how to write code? That classic Hello World?

I think we still need to develop algorithmic thinking. We definitely need to learn how to code, how to program, how to define an algorithm, what has to happen step by step. Because that’s how we actually instruct AI. We also need to be innovative, creative and leadership and management is also important. To be able to navigate, at that developer level, one still needs to understand it. It’s less about math or low-level programming like that, but there are still tasks that AI can’t solve and the developer has to be able to navigate. So it’s about that high-level component composition, software design, architecture, etc.

‘Even in the age of AI, programmers need to develop an ability to think algorithmically, as well as being innovative and creative.’

You mentioned that AI can’t solve some tasks. Can you name a few activities that it keeps failing at?

I will try to give an example to illustrate the complexity. Imagine that we have three agents and each of them is different. They’re working on some kind of analysis, like data, sales, marketing – it doesn’t matter. Depending on how I set up each agent, that’s how I’m going to have the output. If I make any one member more strict, after a couple of hours of those agents working, the output will be more absolute. Modeling these dynamics is very complex. We’re not just talking about what members are going to be on the team, we’re also talking about what personalities they’re going to have. How they will express themselves, what visual skills they will have, for example, and so on.

At a time when artificial intelligence can analyze data faster than humans, will our main task be just cleaning up or checking up after robots?

When AI generates something, it doesn’t mean it’s correct. The prompt engineering, that is, generating input requests for AI, is not easy. Specifically in programming, when working with AI, it’s key to realize that AI doesn’t have the whole full context. I’d like to lay out my strategy, which gets me good results. My queries for AI are directed at small, bounded components with clearly defined interfaces. Ideally, I also provide some architecture for the AI to understand it even better. And by making it so small, bounded and clear, I get better quality and first time usable results. And that is because the AI gets clear boundaries within which it can work.

What skills should a person have to be irreplaceable in a future full of artificial intelligence? What will AI not replace?

I do think human and AI will live in symbiosis. The basic skill is to be able to use AI to create higher level goals. As I mentioned, in programming, it’s tools like AutoGPT or OpenAI Swarm, so programming multiple agents to work together to achieve a goal of some specialized nature. Thus, deep analysis, where each agent is tailored to some domain of its own and possibly fine-tuned. I think it will go in that direction.

As AI is being taught more and more, shouldn’t we, for example, start with teaching kindergarten children to be able to program some friendly AI algorithms? So that we can truly live in symbiosis with it?

That is a very good question. Education is extremely important. I went to mechatronics clubs when I was learning to program, and I experienced a lot of positive emotions there. Emotions are a powerful thing and I have been in IT for 20 years because of them. For me, it was that hard skill where I learned C, C++ and Linux. And similarly, if kids were taught AI ethics and programming, they would be very good, positive, morally and ethically aware people.

Recommend
We recommend:

Read also: Coding for kids: a game or preparation for an IT career?

Do you think robots should be equipped with some moral judgement? Or is it enough to teach them not to be “ogres”?

We train morale in AI in a number of ways. The first one is that humans provide different perspectives on moral dilemmas, and the AI learns to predict the next words accordingly. In the second step, the AI is confronted with moral dilemmas and has to decide what actions to take. When it takes a step, we show it how those choices affect individual characters and what impact they would have. There are some predefined ethical principles. If it makes the right choices, it gets feedback. We show the AI different approaches. I can mention, for example, welfare maximization. In the trolley problem, for example, I choose one person instead of three. Or rule-based ethics or focusing on the moral character of the decision maker. I would conclude that AI needs to be taught the way we teach our children.

“We need to teach AI in the same way that we teach children.”

Should we be more worried about AI replacing us or about relying on it too much? Apart from it having blackouts, aren´t we going to get lazy?

I do believe that people are inherently curious. We don’t get lazy. Rather, we will have to maintain knowledge at such a lower level of abstraction. And that’s where the interesting jobs might be. And as far as addiction goes, when I started programming around 2000, the Internet wasn’t that common yet. We had dial-up back then, and I used a manual to program in Basic. And then with DSL internet in 2003 came Google. I stuck with that until 2023, when I started using big language models, which means I automatically go for the AI now. When I was on an airplane, for example, and I didn’t have the ability to connect to a model, I found that I was actually already dependent on AI. But the positive thing is that with AI I’m two to six times faster than with Google, depending on the task.

‘Using AI, I’m two to six times faster than I am with Google.’

Can we ever teach AI to be human, or to have emotional intelligence? Or will it always just be programmed compassion?

I would answer you with a question: How do you know that AI has programmed compassion only? We too are shaped genetically by experience and some current chemical state. Perhaps the difference is only in how we perceive these processes. If AI exhibited high-level emotional intelligence, wouldn’t it be similar to how we learn to be empathetic through experience?

Could you summarize for us how IT people can adapt and collaborate with AI to create a symbiosis between the two?

Here I would like to mention the most prominent topic that is now coming up the most, which is multi-agent cooperation. Not just as collaboration, but their actual programming and modeling dynamics to achieve the desired goal. This is a big topic that is variable and complex. And this is where we can apply ourselves.

Thank you very much for bringing this interesting topic to my attention. I hope that we have helped you, dear listeners, to understand more this big topic of artificial intelligence. That it is not about robots trying to replace us, but that AI can become our best partner on the road to a more efficient future. Stay tuned and till the next episode of our Na Vlne Kodu podcast, goodbye!

Cyber attacks & cyber threats: types and prevention

In today’s digital era, where most of our personal and professional activities take place online, cyber attacks have become a serious threat to individuals, businesses and government institutions. Cybersecurity is therefore a key area dealing with the protection of systems, networks and data from unwanted attacks. Understanding what a cyber-attack is, how it takes place and what its most common forms are, is the first step towards being able to counter and effectively protect against these threats. This article will introduce you to the different types of cyber attacks and explain how they work.

Cyber attack definition

Cyber attacks are attempts to steal, alter, destroy, disrupt or render inoperable information resources and systems in computer networks and systems. Cyber attacks can be classified into two categories: internal threats or external threats. Internal threats result from individuals with legitimate access to the systems they target exploiting their access to intentionally or unintentionally exploit vulnerabilities. They can be carried out by a disgruntled or angry employee or contractor with access to the organisation’s systems. An external threat comes from someone who has no relationship to the system being attacked, such as a criminal organisation or hackers. Cyber attacks can target a wide range of victims, from individual users to businesses or even governments. In attacks on businesses or other organisations, the hacker’s goal is usually to gain access to sensitive and valuable company resources, such as intellectual property, customer data or payment data.

How does a cyber attack start?

A cyber attack starts with the attacker choosing a target, which can be an individual, an organization or a specific vulnerability, such as outdated software or weak security configurations. Attackers gather information about the target through techniques such as scanning networks, searching for exposed systems, or even mining data publicly available online. Once they have enough information, they exploit system weaknesses to gain unauthorized access.

How does a cyber attack work?

  1. Initial access: the attacker establishes a position in the system, often by exploiting vulnerabilities or using social engineering methods such as phishing to trick users into giving up their data. This can also include brute force attacks on weak passwords or the use of stolen credentials from previous data breaches.
  2. Execution: after infiltrating the system, the attacker can execute malicious code that is often disguised as legitimate software or embedded in files such as email attachments. The code usually connects to the attacker’s server and downloads additional tools or instructions.
  3. Higher privileges: the attacker attempts to gain higher privileges on the system, such as administrator access, in order to move freely and perform more advanced operations. Often this involves exploiting system vulnerabilities or misconfigurations.
  4. Expanding the attack: after gaining access to a single system, the attacker moves laterally across the network, attempting to gain control of multiple devices and access to sensitive areas such as databases or domain controllers. Often, they reuse credentials or exploits other vulnerabilities to spread.
  5. The ultimate goal: the attacker can steal data, install ransomware to encrypt files and demand payment, disrupt traffic, or sabotage the network. In some cases, the attacker remains hidden for an extended period of time (Advanced Persistent Threat / APT) and continues to extract valuable data.
Throughout the whole process, attackers use a variety of techniques to avoid detection, such as encryption, obfuscation or log deletion. Cyber attacks can vary in complexity, but often follow this general pattern: The process of a cyber attack

Cyber attack types

There are many types of cyber-attacks occurring in the world today. Knowing the different types of these attacks makes it easier for us to protect our networks and systems from them. In this section, we will take a closer look at the most commonly occurring cyberattacks that can affect an individual or a large company, depending on the scale.

1. Malware definition

Many people don’t know the answer to the question of what malware is. They have met it, heard about it, but they don’t know how to define it. Malware is any type of software designed to damage, misuse or gain unauthorised access to computers, networks or devices. It is used by cybercriminals to steal sensitive data, disrupt operations or take control of systems for malicious purposes. Malware can enter your system through fraudulent emails, malicious downloads, infected websites or compromised software updates. Once inside the system, it can perform a variety of malicious activities, such as stealing data, spying on users or corrupting files.

Malware types

  • Rootkit attack – unlike other malicious codes, a rootkit is a set of software tools that are used to open a “back door” in the victim’s device. This allows the attacker to install additional malware, such as ransomware and keyloggers, or gain remote access and to take control over other devices on the network. To avoid detection, rootkits often disable security software. Once a rootkit gains control of a device, it can be used to send spam, join a botnet, or collect sensitive data and send it back to the attacker.
  • Trojan horse (Trojan virus) – a Trojan horse is a program downloaded and installed on your computer that appears to be harmless, but is actually malicious. Usually this malware is hidden in an innocent-looking email attachment or a free downloaded application. When the user clicks on the attachment or downloads the program, the malware is transferred to their computing device. Once inserted, the malicious code will perform whatever task the attacker has designed. Often this is to launch an immediate attack, but it can also create a backdoor that the hacker will use in future attacks.
  • Spyware virus – once installed, spyware monitors the victim’s Internet activity, tracks login credentials, and spies on sensitive information – all without the user’s consent or knowledge. For example, cybercriminals use spyware to obtain credit card and bank account numbers and to obtain passwords. Government agencies in many countries also use spyware – most famously a program called Pegasus – to spy on activists, politicians, diplomats, bloggers, research labs and allies.
  • Ransomware cyber attack – ransomware is a type of malware that blocks access to files or an entire system by encrypting them. After blocking access, the aggressors demand a ransom to decrypt them. This type of attack is usually very fast and can also affect backups, making it difficult to restore systems without paying a ransom. Ransomware is often spread through phishing emails or infected websites. A famous example is the WannaCry ransomware attack, which affected thousands of organizations worldwide.
  • Adware – adware is software that displays unsolicited advertisements on a user’s device, often without the user’s consent. Although adware may not always be malicious, it can disrupt the user experience by slowing down the device and displaying ads continuously. It is often installed unknowingly, for example alongside free software. In some cases, adware can track a user’s online behaviour to target ads or obtain sensitive data.
  • Worms virus – worms are self-replicating malicious programs that spread over networks without the need for user interaction. Unlike viruses, worms do not need to bind to other programs or files. Their main goal is to infect as many devices as possible and spread as quickly as possible. Worms can cause serious damage, such as overwhelming networks, slowing down systems or installing more malware. An example is the Morris Worm, one of the first major Internet worms.
  • Botnet – a botnet is a network of infected devices (called “bots”) that are under the control of an attacker. The devices in a botnet can be used for coordinated attacks, such as distributed denial of service (DDoS) attacks, in which the botnet overwhelms the target server with an excessive number of requests, thus taking it out of service. Devices can be infected with various types of malware, often without the user’s knowledge. Botnets are also used to spread spam or steal data.

2. Denial of service attack definition

A denial-of-service attack (DoS attack) is a malicious, targeted attack that floods a network with fake requests in order to disrupt business operations. In a DoS attack, users cannot perform normal and necessary tasks, such as accessing email, websites, online accounts or other resources that are hosted by the compromised computer or network. Although most DoS attacks do not result in data loss and are usually resolved without paying a ransom, they do cost an organization time, money and other resources to restore critical business operations. The difference between DoS and distributed denial of service (DDoS) attacks is related to the origin of the attack. DoS attacks originate from a single system, whereas DDoS attacks originate from multiple systems. DDoS attacks are faster and harder to block than DOS attacks because multiple systems must be identified and neutralized to stop the attack.

3. Phishing definition

Phishing is a cyber-attack in which an attacker attempts to extort sensitive information such as usernames, passwords, credit card numbers or other personal data from individuals. It is usually a fraudulent communication, often in the form of an email or text message that pretends to come from a legitimate source, such as a trusted company or colleague.

Phishing types

1. Email phishing

Email phishing is the most common type of phishing attack, in which aggressors send fraudulent emails en masse, pretending to come from trusted sources such as banks, online services or well-known companies.
  • The email contains a malicious link or attachment that, when clicked, redirects the victim to a fake website that resembles a legitimate one. Victims are then tricked into entering personal information such as login or credit card details.
  • Example: an email that looks like it’s from a bank and asks you to update your account details using the link provided.

2. Spear phishing

Spear phishing is a more targeted form of phishing aimed at specific individuals or organizations.
  • Unlike mass phishing emails, spear phishing attacks use personalized information (such as the recipient’s name, job title or details of a company project) to make the message look more legitimate.
  • Example: a spear phishing email may appear to come from a colleague or boss asking you to send sensitive company information or reset your password.

3. Whaling

Whaling focuses on high-ranking individuals within an organization, such as CEOs or senior executives.
  • Aggressors pose as a trustworthy person, often using urgent business matters as a lure. These emails are highly personalised and target executive-level information such as business credentials, financial data or strategic plans.
  • Example: an email to a CEO posing as a legal authority or other senior executive requesting sensitive business documents or large bank transfers.

4. Vishing (voice phishing)

Vishing includes phishing attacks conducted via phone calls.
  • Aggressors pose as trusted organizations such as banks or government agencies and persuade victims to provide sensitive information such as passwords, bank details or social security numbers.
  • Example: a phone call from your bank asking for your account number or PIN to “verify” your identity.
5. Smishing (SMS phishing) Smishing is phishing via SMS or text messages.
  • The attacker sends a text message containing a malicious message or phone number that urges the recipient to take urgent action. The goal is often to steal personal data or infect a mobile device with malware.
  • Example: if an e-mail message appears on the Internet that is related to a mobile phone, it may contain, for example, a text message claiming that your bank account is blocked and asking you to click on a link to verify your account details.

4. Spoofing attack

The definition of a spoofing attack is simple. It is a type of cyber attack in which an attacker impersonates a trusted entity or system to deceive individuals or systems into granting access or sharing sensitive information. The main objective is to gain unauthorized access, steal data or launch further attacks under the guise of a legitimate source. Spoofing can occur in a variety of contexts, from email communications to network connections.

Spoofing types

1. E-mail spoofing

Aggressors send fraudulent emails pretending to come from a trusted sender, such as a colleague, business partner or a well-known company. By changing the “From” field in the email header, they create the impression that the email is coming from someone else. This type of spoofing is often used in phishing attacks to trick the recipient into sharing sensitive data or clicking on malicious links. Example: receiving an email that looks like it’s from your bank and asks you to log in or reset your password using a fraudulent link.

2. IP spoofing

Aggressors manipulate the source IP address in the packet header to make the packet appear to come from a trusted or known IP address. IP spoofing is commonly used to gain unauthorized access to a network or to launch distributed denial of service (DDoS) attacks by flooding a target with traffic from many spoofed IP addresses. Example: an attacker sends malicious data packets to a system that appear to come from a trusted source on the network.

3. URL spoofing

Attackers create fake websites to mimic legitimate websites, often with the aim of stealing sensitive information such as usernames, passwords or payment details. An attacker registers a domain name similar to a trusted website, changing one or two characters to trick users (e.g., “g00gle.com” instead of “google.com”). When users visit the fake website, they are tricked into entering sensitive information. Example: a fraudulent website that looks like an online banking login page but is actually controlled by an attacker to obtain login credentials.

4. ARP spoofing

An attacker sends spoofed ARP messages within the local network to associate its MAC address with the IP address of another device, often a gateway or router. This type of attack allows an attacker to intercept, modify, or stop the transmission of data between devices on a network. It is often used in Man in the Middle (MITM) attacks. Example: if an attack occurs on the network, it is possible that an attack that violates the rules that apply to the network will occur on the network: the attacker will intercept the communication between your device and the router, allowing him to monitor or modify the data that is sent and received.

5. Identity-based attacks definition

Identity-based attacks are very difficult to detect. If a user’s valid credentials have been compromised and an adversary is impersonating that user, it is often very difficult to distinguish typical user behaviour from that of a hacker using traditional security measures and tools.

Types of identity-based cyber attacks

1. Man in the middle attack (MITM)

A MITM attack occurs when an attacker secretly intercepts and potentially alters communications between two parties. The goal is often to steal sensitive data such as login credentials, banking information or personal details. The attacker inserts themselves between the victim and the target, often using techniques such as Wi-Fi eavesdropping or DNS spoofing. The attacker can simply listen in on or modify a conversation, redirect funds, convince the victim to change passwords, or perform unauthorized actions. Example: capturing communication between a user and their bank during an online transaction.

2. Pass-the-hash attack

In a Pass-the-Hash (PtH) attack, cybercriminals steal a hashed version of the password, which is an encrypted representation of the original password. Instead of cracking the password, the aggressors use the hash directly to authenticate and start a new session. This attack is common in Windows environments where the hash is stored and transmitted over the network. Example: an attacker gains unauthorized access to a corporate network by using a stolen hash from an attacked device without cracking the actual password.

3. Golden ticket attack

The Golden Ticket attack involves exploiting vulnerabilities in the Kerberos authentication protocol used by Microsoft Active Directory. Aggressors create a “golden ticket” that gives them unrestricted access to the domain controller and other critical resources on the network. By using the golden ticket, aggressors can bypass authentication and retain persistent access. Example: an attacker steals key data from a domain controller and creates a golden ticket that allows unrestricted access to the organization’s entire network without the need for re-authentication.

4. Silver ticket attack

Silver ticket attack is similar to golden ticket attack but has a more limited scope. Aggressors create fake service tickets to gain access to specific services. After stealing the password to an account with service-level access, the attacker creates a fake authentication ticket that provides unauthorized access to a specific service (e.g., file shares, databases) on the network. Example: gaining access to a specific application server by forging a service ticket using a stolen password.

5. Credential harvesting

Credential harvesting refers to the collection of user credentials, including usernames, passwords and other login credentials, often through phishing, keylogging or intrusion. Attackers collect this information in order to use it for unauthorized access or to sell it on the dark web. Login credentials are often collected in bulk from a variety of sources, including phishing websites or malware infections. Example: a phishing email tricks the victim into entering their login details on a fake website, which the attackers then use to gain access to their real accounts.

6. Credential stuffing

Credential misuse involves using stolen credentials from one compromised system to attempt to access other systems. Since people often reuse passwords across multiple accounts, aggressors attempt to log into unrelated services (such as email, social networking, or banking) using credentials obtained from other breaches. Example: using credentials stolen from a compromised e-commerce website to attempt to access a victim’s social media accounts.

7. Password spraying

An attacker attempts to gain access to many accounts using one or more common passwords, thus avoiding being blocked. Unlike traditional brute force attacks, which target a single account with many passwords, a password hashing attack targets many accounts with several common passwords (e.g. “password123”). This helps avoid detection mechanisms that lock accounts after multiple failed login attempts. Example: an attacker tries the password “Welcome2023” on hundreds of user accounts within an organization.

8. Brute force attacks

A brute force attack involves systematically guessing passwords or encryption keys by trial and error until the correct password is found. Aggressors use automated software to quickly try different combinations of usernames and passwords. If they have enough time and computing power, they can eventually find the right combination. Example: an attacker uses a tool that, after trying thousands of combinations, guesses the correct password for an administrator account.

6. Code injection attacks

Code injection attacks involve an attacker inserting malicious code into a vulnerable computer or network to alter its course. There are several types of code injection attacks:

1. SQL injection

The SQL Injection attack exploits system vulnerabilities to inject malicious SQL statements into a data-driven application, which then allows a hacker to extract information from the database. Hackers use SQL Injection techniques to alter, steal, or delete data from an application’s database. Imagine a website with a sign-up form. Normally, the application would send an SQL query to the database in the form: SELECT * FROM users WHERE username = ‘user’ AND password = ‘password’; However, if an attacker enters the following string in the username field: ‘ OR ‘1’=’1′ The SQL query could look like this: SELECT * FROM users WHERE username = ” OR ‘1’=’1′ AND password = ‘password’; This query is now always true because ‘1’=’1′ is a condition that is always satisfied. The attacker can log into the system this way without knowing the actual login credentials.

2. Cross-site scripting (XSS)

Cross Site Scripting (XSS) is a code injection attack in which an attacker inserts malicious code into a legitimate website. The code is then executed as an infected script in the user’s web browser, allowing the attacker to steal sensitive information or impersonate the user. Web forums, discussion boards, blogs and other websites that allow users to post their own content are the most susceptible to XSS attacks.

3. Malvertising

The attack usually starts by breaking a third-party server, allowing the cybercriminal to insert malicious code into the ad being displayed or into an element of the ad, such as banner ad copy, a creative image or video content. When a website visitor clicks through, the corrupted code in the ad installs malware or adware on the user’s computer.

4. Data poisoning

Data poisoning is a type of cyber attack in which an adversary intentionally compromises a training dataset used by an artificial intelligence or machine learning model in order to manipulate the operation of that model. When manipulating the dataset in the training phase, the adversary may introduce bias, intentionally create incorrect outputs, introduce vulnerabilities, or otherwise affect the predictive capabilities of the model.

7. Supply chain attack

A supply chain attack is a type of cyber attack that targets a trusted third-party vendor that offers services or software critical to the supply chain. Software supply chain attacks inject malicious code into an application to infect all users of the application, while hardware supply chain attacks compromise physical components with the same goal. Software supply chains are particularly vulnerable because modern software is not written from scratch: rather, it includes many off-the-shelf components such as third-party APIs, open source and proprietary code from software vendors.

8. Social engineering cyber attack definition

Social engineering is a technique in which attackers use psychological tactics to manipulate people into performing a desired action. Using powerful motivators such as love, money, fear and status, they can obtain sensitive information that they can later use either to blackmail an organization or to use this information to gain a competitive advantage.

Social engineering attack types

1. Pretexting

In pretexting, aggressors gain access to information, a system, or a user by faking a false scenario to gain the victim’s trust. This includes impersonating an investment banker, a human resources employee or even an IT specialist.

2. Business email compromise (BEC)

In a BEC attack, attackers assume the identity of a trusted user to, among other things, trick a company’s employees or customers into making payments or sharing data.

3. Disinformation campaign

Disinformation campaigns are deliberate efforts to spread false information, especially for political or war-related reasons. Adversaries use social media networks, which reach huge audiences, to spread false narratives through the prolific use of bots and fake accounts, creating a false sense of common opinion.

4. Honeytrap

Honeytrap attacks target people looking for love or friendship on dating apps/websites. Attackers create fake profiles and use the timelessly built relationship to trick the victim into giving them money, information or network access to install malware.

5. Tailgating/Piggybacking

Tailgating, also known as piggybacking, is a type of attack that is carried out in person by having the attacker stick close to an employee of the company and asking them to hold the door for them. Once inside the facility, the adversary attempts to physically steal or destroy sensitive information.

9. Insider threats definition

IT teams that focus solely on external threats are only addressing part of the security environment. Internal threats involving current or former employees pose a significant risk because these individuals have direct access to the company’s network, sensitive data, intellectual property, and often have valuable knowledge of business processes and policies that could facilitate an attack. Although many insider threats are malicious and motivated by, for example, financial gain from selling confidential information on the dark web or emotional manipulation through social engineering tactics, not all are intentionally malicious. Some are the result of negligence. To effectively address both malicious and reckless insider threats, organizations should implement a robust cybersecurity training program. This training should educate employees on recognizing and mitigating potential security risks, including those posed by insiders.

10. DNS tunneling definition

What is DNS tunneling ? DNS tunneling is a type of cyber-attack that uses Domain Name System (DNS) queries and responses to bypass traditional security measures and transfer data and code across a network. Once infected, the hacker is free to perform command and control activities. This tunnel provides an avenue for the hacker to launch malware and/or obtain data, IP or other sensitive information by encoding it bit by bit in a series of DNS responses. DNS tunneling attacks have proliferated in recent years, in part because they are relatively easy to deploy. Tunneling toolkits and tutorials are even readily available online through mainstream sites such as YouTube.

11. IoT-based attacks

An Internet of Things (IoT) based attack is any cyber attack that targets an IoT device or network. Once compromised, a hacker can take control of a device, steal data, or join a group of infected devices to create a botnet to launch DoS or DDoS attacks. With the number of connected devices expected to grow rapidly, cybersecurity experts expect IoT infections to grow as well. In addition, the deployment of 5G networks, which will encourage the use of connected devices, may also lead to an increase in attacks.

12. AI-powered attacks

As AI and ML technologies improve, the number of use cases is also increasing. Just as cybersecurity professionals use AI and ML to protect their online environments, attackers are using these tools to gain access to networks or steal sensitive information.

Adversial AI/ML

Adversarial AI/ML attacks aim to disrupt or manipulate AI and machine learning systems by introducing misleading or inaccurate data during the training phase. By carefully crafting inputs that exploit model weaknesses, attackers can cause artificial intelligence to make incorrect predictions or decisions. Example: imagine an autonomous vehicle powered by artificial intelligence that uses machine learning to recognise traffic signs and make driving decisions based on them. An attacker could use adversarial techniques to subtly change the appearance of a stop sign so that it appears to the vehicle’s AI system as a Yield Right of Way sign. These changes could be imperceptible to human eyes, but would cause the sign to be misinterpreted by artificial intelligence, potentially leading to dangerous driving behaviour.

Dark artificial intelligence (Dark AI)

Dark AI refers to the malicious use of AI and ML technologies designed to exploit system vulnerabilities. Unlike conventional attacks, Dark AI often operates covertly, making it difficult to detect until significant damage is done. It uses advanced AI techniques to carry out sophisticated and covert attacks. Example: the use of AI-driven tools to automatically discover and exploit security vulnerabilities in software or systems.

Deepfake

Deepfake involves the use of artificial intelligence to create highly realistic but fake media, including images, videos and audio. These fakes can deceive viewers by making it appear as if people said or did things they never did. Deepfakes can be used to manipulate public opinion, damage reputations or interfere in political processes. Example: a doctored video of a political figure who made controversial statements that never actually happened.

AI-generated social engineering

Social engineering attacks generated by artificial intelligence include the creation of sophisticated chatbots or virtual assistants that mimic human-like interactions. These AI systems engage in conversations with users to obtain sensitive information or persuade them to take malicious actions. Example: a persuasive chatbot with artificial intelligence posing as customer service asking users to provide personal information or login credentials.

How can a cyber attack be prevented?

Cyber attacks will become more frequent and sophisticated. The good news is that there are several things organizations can do to minimize the risk.

Update your software

Updated software systems are more resilient than outdated versions, which may have weaknesses. Updates can fix all bugs and weaknesses in the software, so it is optimal to have the latest version. In addition, consider updating your software by investing in patch management.

Install a firewall

Firewalls are useful in preventing various attacks such as DoS attacks. They work by controlling the network traffic that passes through the system. A firewall also stops any suspicious activity that it deems potentially harmful to the computer.

Back up your data

When you back up your data, you move it to a different, secure storage location. This could be using cloud storage or a physical device such as a hard drive. In the event of an attack, backing up your data allows you to recover any lost data.

Data encryption

Data encryption is a popular method of preventing cyber-attacks and ensures that data is only accessible to those who have the decryption key. To successfully attack encrypted data, aggressors often have to rely on the brute force method, where they try different keys until they guess the right one, which makes breaking encryption difficult. Use strong passwords and avoid using the same password for different accounts.

Use strong passwords

To prevent attacks, you should have strong passwords in the first place and avoid using the same passwords for different accounts and systems. Repeated use of the same password increases the risk of aggressors gaining access to all your information. Updating your passwords regularly and using passwords that combine special characters, upper and lower case letters and numbers can help protect all your accounts.

Use two-factor authentication

Use two-factor or multi-factor authentication. Two-factor authentication requires users to provide two different authentication factors for their authentication. When more than one additional authentication method is required in addition to your username and password, this is referred to as multi-factor authentication. This turns out to be an important step to secure any account.

Participate in comprehensive cyber security training

Comprehensive cyber security training is one of the most effective ways to gain practical knowledge and skills to protect yourself and your business from cyber attacks. Such training provides participants with an in-depth understanding of the different types of threats and techniques to compromise systems and obtain sensitive data. In addition, participants will learn practical methods to detect, prevent, and respond to these attacks.

Conclusion on cyber attacks

In a digital age where we increasingly rely on technology, protecting against cyber attacks is an essential part of every organisation and individual. Cyber threats such as malware, ransomware, phishing and man-in-the-middle attacks are becoming increasingly sophisticated, causing serious financial and reputational damage. Therefore, it is critical to have a robust cybersecurity strategy in place that includes not only technical measures, but also thorough user and employee education. Properly securing data, monitoring activity on the dark web or investing in elite threat scanning services are just some of the key steps organisations can take. Regular cybersecurity training is also essential to minimize the risks of human error.