INTERNET THREATS

Malware concept in word tag cloud on white background

          There are a lot of Internet Threats that can harm our computer without us knowing it. So here are some information about Internet Threats:

          First is the Malware or The malicious Software. There are different types of it:
a. Virus- Virus is a malicious program that was designed to replicate itself and transfer from one computer to another.

HERE ARE SOME EXAMPLES OF VIRUS:

* Resident Virus
*Direct Action Virus
*Browser Hijacker
*Overwrite Virus
*Web Scripting Virus

b. Worm- Worm is malicious program that transfers from one computer to another computer by any type of means. One example is the ILOVEYOU worm or the Love Bug Worm which was created by a Filipino.

HERE ARE SOME EXAMPLE OF WORM:

*BadTrans
*Blaster Worm
*DoomJuice
*ILOVEYOU Worm
*Kak

c. Trojan- Trojan is a malicious program that is disguised as a useful program but once the users downloaded or installed it, it will leave their PC unprotected and this can allows the hackers to have access to their information. Under the Trojan is the Rogue Security Software. It can tricks the users into posing that it is a security software but in reality, it is not.

HERE ARE SOME EXAMPLE OF TROJAN:

*BackDoor
*Exploit
*Trojan-Ddos
*Trojan-Downloader
*Trojan-Ransom

d. Spyware- Spyware is a program that runs in the background without the users knowing it that’s why it is called “spy”. Spyware has the ability to monitor what the users are doing through the keylogging. Keyloggers is used to record the keystroke done by the users. This can allows the hackers to steal the user’s password and any other important information about them.

HERE ARE SOME EXAMPLE OF SPYWARE:

*CoolWebSearch
*Internet Optimizer
*BlazeFind
*Hot as Hell
*FinFisher

          2. Spam- A lot people already become a victim of this. Spam are the unwanted emails send to users which can be used to send malware.

          3. Phishing- This can acquire sensitive personal information of the users like their passwords and credit card details. It will direct the users to visit a website and asked them to update their personal information. Under this Phishing is the Pharming. This is a more complicated way of Phishing because it exploits the DNS or the Domain Name Service Sysytem.

Reference: Empowerment Technologies Book

Leave a comment