Internet or the Network which has evolved over time since 1969, from ARPANET to today’s fast communicating network. Today network has become a very essential part of our life without network we are nothing, having a network is good but what about security i.e. having a secure network is more effective than just having a network, so here is a list of Online Threats that might affect you so beware of them.
The fact that most of our emails accounts come with a ‘Spam’ or ‘Junk’ folder insinuates that spam emails are a huge issue, with more than 50% of emails being siphoned into these folders. Aside from being an annoyance, spam emails are not a direct threat. However, many can contain malware.
Adware is often included in many shareware or freeware downloads as a legitimate way of generating advertising revenues that help fund development. However, some websites are infected with malicious adware that we automatically downloaded to your computer. When this has been completed, Trojans can be used.
Trojans leave your computer completely unprotected, which can mean that hackers can steal any data from your system. Trojans often present themselves as harmless computer programmes so that hackers can penetrate your computer without being detected.
Worms usually make their way on to a computer via a malicious email attachment or USB stick. Once your computer has been infected by a worm, it will likely send itself to every email address logged in your system. To the receiver, your email will appear harmless, until they open it and are infected by the same worm.
In its simplest terms, phishing is a form of fraudulent activity. More often than not, official-looking emails are sent impersonating a well-known provider, such as a bank. These emails are sent to acquire people’s passwords and credit card details.
Phishing is done mainly by Spam E-Mails.
A Spyware is an all-encompassing internet nasty and is usually attached to pop-ups of downloadable files. Once installed on your computer, spyware can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications. Whoever is controlling the spyware has access to your personal details without you even knowing.
Similar to a part of spyware, keyloggers record a user’s keyboard actions. Most keyloggers will be looking for distinguishable key entries, such as bank card details and passwords. Keylogging is often linked to identity and intellectual property theft.
Pharming is a more complex version of phishing that exploits the DNS system. Pharmers often create web pages mimicking that of a trustworthy business, such as an online banking log-in page. Users will then enter their details, thinking they are logging in to their usual service, and their details will be stolen by the pharmer.
10. Rogue Security System
Rogue security software is a form of malicious software and Internet fraud that misleads users into believing, there is a virus on their computer and manipulates them into paying money for a fake malware removal tool (that actually introduces malware to the computer). It is a form of scareware that manipulates users through fear, and a form of ransomware.Rogue security software has been a serious security threat in desktop computing since 2008.