Home > Computer > Computer Threats (A to Z)-Cyber Security

Computer Threats (A to Z)-Cyber Security

Computer Threat

<“100 % Security in Cyber World is a Myth”>

Threat– is a possible danger that might exploit a vulnerability to breach security thus causing possible harm.

Risk– is a vulnerability that could allow the loss of confidentiality, integrity or availability (CIA) of Computers services and where there is a possibility of the vulnerability being exploited.

TYPES OF COMPUTER SECURITY THREATS

Computer Security
Computer Security


ADWARE

Adware is a form of threat where your computer will start popping out a lot of advertisements. It can be from non-adult materials to adult materials because any kind of advertisements will help the host in making money. It is not really harmful threat but can be pretty annoying.

BACKDOOR

Backdoor is a form of a threat where once a system is vulnerable to this threat, the attacker will be able to bypass all the regular authentication services. It is usually installed before any malware infection because having a backdoor installed will ease the transfer effort of those threats.

BOTNET

Botnet-Computer Threat
Botnet-Computer Threat

Botnet is an infected network, which is controlled by a BotMaster. Each infected Computers is called a bot. It mostly infects through drive-by downloads or even malware infection. The result of this threat is the, victim’s Computers, which is the bot, will be used for a large-scale attack like DDoS.



BLUEJACKING

Bluejacking uses the Bluetooth technology. What it does is it will connect to your Bluetooth device and send some message to another Bluetooth device. It is not something damaging to your privacy or device system compared to the Bluesnarfing threat.

BLUESNARFING

Bluesnarfing is all about having an unauthorized access to a specific mobile phone, laptop, or (Personal Digital Assistant) PDA via Bluetooth connection. By having such unauthorized access, personal stuff such as photos, calendar, contacts and SMS will all be revealed and probably even stolen.

BOOT SECTOR VIRUS

Boot sector virus is that places its own codes into Computer’s Disk Operating System (DOS) boot sector or also known as the Master Boot Record. It will start executing during the bootup period and cause high damage without being deleted.

BROWSER HIJACKERS

Browser Hijackers uses the Trojan Malware that takes control of the victim’s web browsing session. It is extremely dangerous especially when the victim is trying to send some money via online banking because that is the best time for the hijacker to alter the destination of the bank account and even amount.

CRIMEWARE

Crimeware is a form of Malware, which takes control of your computer to commit a computer crime. Instead of the hacker himself committing the crime, it plants a Trojan to order you to commit a crime instead. This will make the hacker himself clean from whatever crime that he had done.

CHAIN LETTERS

Chain letters usually says if you don’t forward that particular message or email to 20 people or more, your account will be deleted and people really believe that.

COOKIES

Chrome cookies view-
Chrome cookies view-

Cookies are not really Malware. It is used by most websites to store something into your computer. It is here because it has the ability to store things on your Computers and track your activities within the site. If you really don’t like the existence of cookies, you can choose to reject using cookies for some of the sites, which you do not know.

DROPPER

Dropper is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor. There are two types of Dropper where one is to immediately drop and install to avoid Antivirus detection. Another type of Dropper will only drop a small file where this small file will auto trigger a download process to download the Malware.


DIALER

Dialer makes use of your Internet modem to dial international numbers, which are pretty costly. Today, this type of threat is more popular on Android because it can make use of the phone call to send SMS to premium numbers.

DDoS

DDoS is one of the most famous things done by hackers, which is to send millions of traffic to a single server to cause the system to go down (crash). Service provided is interrupted. This is known as Distributed Denial of Service (DDoS).

EXPLOIT

Exploit is a form of software, which is programmed specifically to attack certain vulnerability. For instance, if your web browser is vulnerable to some outdated vulnerable flash plugin, an exploit will work only on your web browser and plugin. The way to avoid hitting into exploit is to always patch your software because software patches are there to fix vulnerabilities.

FAKE ANTI-VIRUS

Fake anti-virus is a very popular threat among Mac users. Due to the reason that Mac user seldom faces a virus infection, scaring them with a message, which tells them that their computer is infected with a virus, is pretty useful because it results into purchasing a bogus antivirus, which does nothing.

KEYLOGGER

Keylogger is something that keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credentials such as username and password. It is also usually a sub-function of a powerful Trojan.

MALVERTISING

Malvertising is the use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.

MOUSETRAPPING

Mousetrapping will trap your web browser to a particular website only. If you try to type another website, it will automatically redirect you back. If you try clicking forward/backward of the navigation button, it will also redirect you back. If you try to close your browser and re-open it, it will set the homepage to that website and you can never get out of this threat unless you remove it.

OBFUSCATED SPAM

Obfuscated spam is a spam mail. It is obfuscated in the way that it does not look like any spamming message so that it can trick the potential victim into clicking it. Spam mail today looks very genuine and if you are not careful, you might just fall for what they are offering.

PHISHING

Facebook-phishing-page
Facebook-phishing-page

Phishing is a technique in which a fake website which is designed to look almost like the actual website. The idea of this attack is to trick the user into entering their username and password into the fake login form, which serves the purpose of stealing the identity of the victim. Every form sent out from the phishing site will not go to the actual server, but the attacker-controlled server.

PHARMING

Pharming works more or less like phishing but it is a little tricky here. There are two types of pharming the first is Domain Name Server (DNS) poisoning where your DNS is being compromised and all your traffic will be redirected to the attacker’s DNS. The other type of pharming is to edit your HOST file where even if you typed www.gkaim.com on your web browser, it will still redirect you to another site. One thing similar is that both are equally dangerous.

SPYWARE

Spyware is a Malware designed to spy on the victim’s computer. If your computer is infected with it, probably your daily activity or certain activity will be spied on by the spyware and it will find a way to contact the host of this malware. Mostly, the use of this spyware is to know what your daily activity is so that the attacker can make use of your information. Such as if you browse on books for a week every day, the attacker will try to come out with a book scam to cheat on your money.

SCAREWARE

Scareware is something that is planted into your system and immediately informs you that you have hundreds of infections, which you don’t have. The idea here is to trick you into purchasing a bogus anti-malware where it claims to remove those threats. It is all about cheating your money but the approach is a little different here because it scares you so that you will buy.

TROJAN

Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and Spy Eye. It has the ability to hide from antivirus detection and steal important banking data to compromise your bank account. If the Trojan is really powerful, it can take over your entire security system as well. As a result, a Trojan can cause many types of damages starting from your own Computers to your online account.

VIRUS DOCUMENT

Virus Document spread through document files especially PDF documents. Usually people will only advice you not to simply execute an EXE file but in today’s world with today’s Technology, document file should also be avoided. It is best if you use an online virus scanner to scan first before opening any single file, which you feel is suspicious.



VIRUS

Virus is a malicious program which replicates itself and aims to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. It is not so popular today because Malware today is designed to earn money over destruction. As a result, a virus is only available for people who want to use it for some sort of revenge purpose.

WORMS

Worms are one of the most harmless threats as it is a program designed only to spread. It does not alter your system to cause you nightmares with your Computers, but it can spread from one Computers to another computer within a network or even the Internet . The Computers security risk here is that, it will use up your computer hard disk space due to the replication and take up most of your bandwidth due to the spread.

WABBITS

Wabbits is a self-replicating threat but it does not work like a Virus or Worms. It does not harm your system like a Virus and it does not replicate via your LAN network like a Worms. An example of Wabsits attack is the fork bomb, a form of Distributed Denial of Service (DDoS


< IMPORTANT LINKS FOR YOU >
Internet
Computers
Technology
Science

>>Click here and be in touch to get latest update <<

Summary
Article Name=>
Computer Threat
Description=>
Threat is a possible danger that might exploit a vulnerability to breach security thus causing possible harm.
Author=>
Publisher Name=>
Gkaim.com
Admin
Welcome Sir, .. Myself Vikas Chaudhary , i was interested in general knowledge since childhood , so i thought why not to share my knowledge with you, that's why i created this educational blog. Here you find world wide general knowledge of all Latest technology , Science & History Que , and Mysterious fact of the world. Here you also find knowledge about cyber security. Thanks for visit.. keep supporting....keep Loving
https://www.gkaim.com
gkaim.com @ 2018 | Theme by => Vikas Chaudhary.
    \