One of the most potent tools in a cyber criminal's arsenal is the 'distributed denial of service' attack - commonly known as a DDoS attack. These prolific hacks can take even the most protected computers offline.
Today, the Labour Party said that it has experienced a "sophisticated and large-scale cyber attack" on its digital platforms. It has reported this may have been a DDoS attack, although this has not yet been confirmed. But what exactly are DDoS attacks and how dangerous are they?
How does a DDoS attack work?
DDoS attacks harness the power of a network of tens of thousands of compromised computers, known as a "botnet", to flood a website's servers with page view requests, leaving legitimate traffic unable to get through.
In a similar way that sites such as Ticketmaster crash when one-off or hugely popular event tickets are released, DDoS attacks overwhelm the target server, flooding it with traffic so that it's unable to function properly.
The huge amount of connection requests can, in some cases, cause entire websites to crash.
How does a computer become part of a botnet?
In order to add computers to a botnet, a hacker must first gain control of the machine. They achieve this by exploiting vulnerabilities within the computer's operating system to install malicious software on the computer that provides them with always-on, remote access to the PC.
This means that attackers can exploit your computer to use it as part of the DDoS attack, or access it remotely and retrieve usernames, passwords, financial information and other sensitive data.
What do we know about the attack on Labour?
The cyber attack on Britain's opposition Labour Party was a short-lived and unsuccessful attempt to take the party's websites offline, a security official said.
The attack on Labour was a Distributed Denial of Service (DDOS) attack, The Telegraph understands.
An initial investigation indicated the attack was not particularly sophisticated, the official said. "It was really very everyday, nothing more than what you would expect to see on a regular basis."
Labour said earlier on Tuesday it was subject to a large-scale cyber attack on its digital platforms but that it was confident no data breach occurred just weeks before a national election.
In a statement, a Labour Party spokesman said: "We have experienced a sophisticated and large scale cyber attack on Labour digital platforms.
"We took swift action and these attempts failed due to our robust security systems. The integrity of all our platforms was maintained and we are confident that no data breach occurred.
"Our security procedures have slowed down some of our campaign activities, but these were restored this morning and we are back up to full speed. We have reported the matter to the National Cyber Security Centre.
"Labour is out campaigning hard both on and offline for a Labour government that will bring the real change our country needs."
Could my computer be affected?
Any computer is vulnerable to being added to a botnet. The malware necessary to exploit devices can be installed without your knowledge if you click on a malicious link, or visit a website that is serving infected adverts.
That's why it's crucial to ensure your antivirus software is up-to-date, that you have downloaded and installed the latest security patches for your computer, and that you are using a firewall to control what programs can and cannot gain access to their machine via the internet. If you don't have this protection, you're an easy target for hackers.
Other internet-connected devices have fallen victim too, such as smart webcams, thermostats and household items. In order to protect these gadgets from becoming weapons make sure you always download security updates.
How do hackers use botnets to launch attacks?
Once a computer or smart device has been compromised, it can be called into action by the hacker at a moment's notice. Millions of computers across the world are estimated to be enslaved into botnets.
To exploit a botnet, all a hacker needs to do is run a small program that communicates with all the computers they control. The hacker can then command those computers to start dialling out across the internet to a specific server or website. The aim is to flood servers with tens of thousands of page view requests in a short period of time, paralysing the network.
Although the impact of a distributed denial of service attack can be cataclysmic for websites, they are relatively easy to execute for someone with the right technical expertise.
Building the botnet is the time-consuming part, so much so that enterprising cyber criminals will even "lease" bonnets to one another for spur-of-the-moment attacks. Researchers at security company Imperva estimate that some criminal networks are leasing botnets for as little as $38 (£31) per month.
Why would attackers want to crash websites with a DDoS?
People carry out DDoS attacks for a variety of reasons, from "bedroom hackers" who simply want the bragging rights, to cyber criminals that are known to use them for blackmail.
Gambling websites and gaming networks have been high-profile targets of these attacks. For example, hackers have threatened to overwhelm gambling sites just before a big race, match or fight, when the site would expect to be handling lots of bets from customers, unless the site pays a "ransom" to stay online.
DDoS can also be a weapon for those engaged in cyber warfare. For example, the attacks were used during the conflict between Georgia and Russia against high-profile websites in both countries, although the perpetrators were never identified.
The cost of a DDoS attack
It has been estimated that DDoS attacks can cost businesses up to $40,000 per hour that their websites are offline.
That cost can be much higher too with sustained and widespread attacks. For example, the 2016 attack against Dyn, one of a handful of "domain name server" providers, brought down all web addresses registered with its service. These included Twitter, Reddit, eBay, the Telegraph and many more.