The internet is as dangerous as the real world in terms of insecurity. There are many tactics used by hackers to derive confidential information from
The internet is as dangerous as the real world in terms of insecurity. There are many tactics used by hackers to derive confidential information from your business without you sensing danger. You should know these techniques, as explained below so that you can protect your business better.
Written in full, this is short form for “Malicious Software.” The definition given for malware is an expression used to describe “varying kinds of aggressive, invasive, or frustrating program encryption or software” Malware include worms, computer viruses, dishonest spyware, Trojan horses and rootkits that are ill intended, whose details are shown below.
Just like a disease, this virus is small software that is transmitted from one infected computer to another. Your data can be stolen, erased or ruined entirely by this virus. All information on your hard drive could be wiped out within a short period of time. Emails are also another place where viruses can spread within computer networks.
Rogue Security Software:
These are very hard to detect since they pose as genuine alerts and notifications for security updates. They present themselves as pop-up windows with the option of opening a certain link to get rid of unwanted malware, while in actual sense, you download this malware. Methods of protecting your computer are available on Microsoft’s website.
This malware is very dangerous once it gets onto your computer. It is designed to record your encryption codes by noting keystrokes (Keystroke Logger) or to even take over the function of your webcam and your every move is captured from an unknown end.
This is a description of the Trojan software that cybercriminals developed to secretly watch their targets. Key logger is a good example whereby every key typed on your computer will be detected and recorded. This information is then transmitted over the internet to unknown destination. Parents mostly use this key logger to monitor their children’s use of the computer and some employers want to see how the employees are using the internet.
This is a system application that has the ability to duplicate itself onto another machine without assistance from a human being. This duplication process is wide and fast. For instance, a worm can move through your email address book and then through to all the subsequent contacts of the recipient of that email. Over 8 million computers were infected by Conficker work (also called Downadup)in four days. This is how malignant the worm is.
This is a network of machines linked to the internet that have been invaded by a cybercriminal either through a virus or Trojan horse. If a botnet is large enough, it can be used to disable a website by use of denial-of-service (DoS) whereby the server is bogged down with access requests.
This is basically unwanted emails filling up your space. This could vary from innocent annoying advertisements to emails with links which once open download malicious applications on your machine.
These are tricks to get you divulge confidential details. They are presented as very genuine emails from service providers like your bank in need of your details to update their database
This is the use of various techniques to become an administrator of a computer or a network of computers. This can come into your machines by use of key loggers or a hacker taking advantage of a certain weak system in your computer network. In 2005, rootkits were spread through copying Sony BMG music CDs onto your computer.