Common Threat that every internet user need to be Aware of!

 

Internet is not a safe place, basically. Users did not realize whether they safe or not, or already been affected by various of threats that happened to be on internet.

 

Below are the various common threats that we can learn and what you should know to ensure safe Internet browsing

 

Malware

– Malware is one of the more common ways to infiltrate or damage your computer.

– Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

 

– How it works:

>>> a pop-up message that tells you your computer has a security problem or other false information

>>> reformat the hard drive of your computer

>>> alter or delete files

>>> steal private information

>>> send emails to people but using your emails

>>> take control of your computer and all the software running on it

 

– How to prevent:

>>> protect your computers, laptops and tablets

>>> always follow the guidelines to create strong passwords

>>> never write your password down or store it on or near your computer or laptop

>>> use anti-virus, anti-spyware, anti-spam software

>>> use firewall to make sure only the users you approve can access your data and information through the web

 

Pharming

– common type of online fraud

– redirects users to false websites without them even knowing it

 

– How it works:

>>> convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details

>>> you may enter your personal information and unknowingly give it to someone with malicious intent

 

– How to prevent:

>>> using a strong password

>>> connect safely your social media and protect your profile

>>> staying safe when you go online or having fub like playing games online

>>> always protect your basic identity from being stole

 

Pishing

– used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort

– fake emails, text messages and websites created to look like they’re from authentic companies

– sent by criminals to steal personal and financial information from you

– also known as snooping

 

– How it works:

>>> trick you into giving them information by asking you to update, validate or confirm your account

>>> provides cyber criminals with your username and passwords so that they can access your accounts

 

– How to prevent:

>>> using a strong password

>>> connect safely your social media and protect your profile

>>> staying safe when you go online or having fub like playing games online

>>> always protect your basic identity from being stole

 

Spoofing

– used in conjunction with phishing in an attempt to steal your information

– website or email address that is created to look like it comes from a legitimate source

– email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real

 

– How it works:

>>> spam using your email address to your contact list

>>> recreates websites that closely resemble the authentic site

 

– How to prevent:

>>> using a strong password

>>> connect safely your social media and protect your profile

>>> staying safe when you go online or having fub like playing games online

>>> always protect your basic identity from being stole

 

Distributed denial-of-service (DDoS) attack

– an attack in which multiple compromised computer systems attack a target

– flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down

– this threat have been carried out by diverse threat actors, ranging from individual criminal hackers to organized crime rings and government agencies

 

– How it works:

>>> the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master

>>> attack master system identifies other vulnerable systems and gains control over them by either infecting the systems with malware or through bypassing the authentication controls

 

– How to prevent:

>>> the business impact of these attacks can be minimized through some core information security practices

>>> have a solid patch management practices

>>> email phishing testing and user awareness

>>> proactive network monitoring and alerting

 

 

The are so many threats these days. We, as a user, need to be aware of this kind of security things so that our personal information will not be stolen.

 

Source: Get Cyber Safe, commonplaces, techtarget, TechTerms

%d bloggers like this: