Skip to main content

Common Cyber Threats

With changing technology, everyday new kinds of threats showing up in different forms. The most common threats to be aware of


HACKING : Any unauthorized access to a computer by using different tools or techniques or software(malware). An intruder finds weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information. Often installs a Trojan horse, providing a back door for hackers to enter and search for your information.


MALWARE : Malicious Software (Malware)  is one of the more common ways to infiltrate or damage your computer  such as computer viruses, worms, Trojan horses, spyware, and adware. Also uses intimidate you with scareware, which provides false information like security or virus issues. These malware can alter or delete files or reformat the hard drive of your computer causing you to lose all your information or steal sensitive information. Also, it can take control of your computer and all the software running on it.


PHARMING : Pharming is a common type of online fraud.  It  points user to  a malicious and illegitimate website by redirecting  or spoofing the  URL. Even if the URL is entered correctly, it can still be redirected to a fake website. This fake website looks identical to real site but collects and steal  your personal information.


PHISHING : Attackers use fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”. Trick you into giving them information by asking you to update, validate or confirm your account. It is used in pair with pharming to steal information. and often successful to provide cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers.


RANSOMWARE : Ransomware is a type of malware that restricts access to your computer or your files and display messages to demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements. There are two common types of ransomware:

Lockscreen Ransomware: Prevents you from accessing your computer and demands a payment be made for you to regain access. 

Encryption ransomware: Encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them.


SPYWARE & ADWARE : This are software often used by third parties to infiltrate your computer. to collect personal information about you without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses.


TROJAN HORSE : Trojan horse gets its name from Greek Mythology where a wooden horse used by Trojan to infiltrate the enemies walls. It is a malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded. It can delete your files, use your computer to hack other computers, watch you through your web cam, log your keystrokes (such as a credit card number you entered in an online purchase), record usernames, passwords and other personal information.


SPAM : Spam is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs. Spam often connected Phishing, malware and ransomware.


SPOOFING : This technique is often used in conjunction with phishing in an attempt to steal your information. A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real. Spends spam using your email address, or a variation of your email address, to your contact list. Spoofing is often connected Pharming and Ransomware


SPYWARE & ADWARE : This are software often used by third parties to infiltrate your computer. to collect personal information about you without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses.


TROJAN HORSE : Trojan horse gets its name from Greek Mythology where a wooden horse used by Trojan to infiltrate the enemies walls. It is a malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded. It can delete your files, use your computer to hack other computers, watch you through your web cam, log your keystrokes (such as a credit card number you entered in an online purchase), record usernames, passwords and other personal information.


VIRUS : These are malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus. It can send spam, provide access to your computer and other information, scan  and find personal information like passwords on your computer, disable your security settings etc.


WORMS : Worms are a common threat to computers and the Internet as a whole as it tends to create damage to the system. A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself. Spread to everyone in your contact list. Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue.


BOTNETS : One of the most common cyber security threat but  they go largely undetected and most users are unaware of it's presence. It is  collection of software robots, or simple called  'bots', that creates an army of infected computers (referred as ‘zombies') that are remotely controlled by the originator. Once infected your computer becomes part of it and you may not even know it.

Malicious users take  advantage of security vulnerabilities or weaknesses, which helps them nto could take control of your computer. Afterwards, it  force your computer to send huge amounts of data to a website or send spam to particular email addresses, Spread all types of malware or can use your computer as part of a denial of service attack against other systems.


DISTRIBUTED DENIAL-OF-SERVICE (DDoS) ATTACK :  A distributed denial-of-service (DDoS) attack or DDoS attack means when a malicious user gets a network of zombie computers(botnets) to sabotage a target which is specific website or server. The attack happens when the malicious controller tells all botnet computers to contact a specific website or server over and over again, this floods a network with useless information. That increase in the volume of traffic overloads the website or server causing it to be slow for legitimate users, sometimes to the point that the website or server shuts down completely.


WI-FI EAVESDROPPING : WiFi eavesdropping is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi network. Potentially access your computer with the right equipment. Steal your personal information including logins and passwords.


KRACK ATTACK : The Key reinstallation attack (or Krack) vulnerability allows a malicious actor to read encrypted network traffic on a Wi-Fi Protected Access II (WPA2) router and send traffic back to the network. This can affect both personal (home users, and small businesses) and enterprise networks. Any devices that are connected to the network, such as laptops, smartphones, smart devices, even an installed USB key, can be read by the attacker. It can use this vulnerability to steal sensitive information, and also insert malware or ransomware that would make a website unsafe to visit. However,  Krack is unable to compromise Virtual Private Networks (VPN) or HTTPS protocols used by online shopping and banking sites.


Learn more about how to safeguard yourself, your computer and your business from most common cyber security threats at SOLNET CANADA and ESTIOPI CYBERSAFE


Comments

Popular posts from this blog

Business Phone System ( Managed VOIP PBX)

  Business Phone System ( Managed VOIP PBX) Phone systems for business is no longer just  a tool for making and receiving calls. It's an important tool to connect and collaborate with team members and customers using audio, video, text, file sharing, conference calls and more with flexibility to be able to communicate while at office, working from home or off-site or at away location. For most businesses, their phone is their primary point of contact with their customers. Any disconnection or call drops or issues with the phone system  means your business is missing out  from current and potential customers, and you are at the complete  mercy of the traditional  telecom service provider while you wait for your service to be restored. Typically, businesses implement  a phone system in the work environment  to connect and collaborate. For the longest time businesses have been choosing what's available or been referred or been approached  at that given time and once a working syst

CYBERSECURITY BASIC TIPS - How to protect yourself from hacking ?

Work from Home and Remote Access for Small Business

  Work from Home and Remote Access for Small Business   This pandemic has taught us many things and one of those things includes being flexible and adaptable in business. Not all business has opportunities to be completely flexible and adaptable according to business situations but all business has certain avenues to do so. Adaptability can be seen as being lean in operations, reduce overhead costs, revisiting technology and recurring expenses, offering employee flexibility, entering into online marketplace, creating digital presence and marketing, reducing maintenance costs are to name a few. If researched properly, many businesses needs just few small steps can help cover the basics and make business more flexible to be adaptable. Every business is different with varying scope of changes. Many businesses which are office based, who share common space and technology to perform day to day tasks. A work from home setup is very fruitful for those businesses as it allows to be lea