Cyber safety (This is a reeeeally long one)

In this article I’ll be including a list of cyber threats to watch out for and some tips to be safe against identity and personal data thefts, along with some facebook safety points.

 

Starting with the list of threats. There are a lot of different types of threats, but I’m just going to include the most common ones and how to avoid them. I gathered the following data from different sources that list security threats.

 

Botnets

 

Undetected.

 

A collection of software robots, or ‘bots’, that creates an army of infected computers (known as ‘zombies’) that are remotely controlled by the originator.

 

  • They can send spam emails with viruses attached.
  • They can spread all types of malware.
  • They can use computer as part of a denial of service attack against other systems.

 

Distributed denial-of-service (DDoS) attack

 

When a user gets a network of ‘zombie’ computers to sabotage a specific website or server. The attack happens when the user tells all the zombie computers to contact a specific website or server over and over again. That increase in the volume of traffic overloads the website or server causing it to be slow for legitimate users, sometimes to the point that the website or server shuts down completely.

 

It could be possible for users to use our computer in one of these attacks. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of our computer. They could then force our computer to send huge amounts of data to a website or send spam to particular email addresses. The attacks are “distributed” because the attacker is using multiple computers, including ours, to launch the denial-of-service attacks.

 

 

The most common and obvious type of DDoS attack occurs when an attacker “floods” a network with useless information. When we type a URL into our browser, we are sending a request to that site’s computer server to view the page. The server can only process a certain number of requests at once. So if an attacker overloads the server with requests, it can’t process ours. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying access to legitimate users.

 

 

Steps to reduce the risk:

  • Anti-virus softwares.
  • Install a powerful Firewall, and configure it to restrict traffic coming into and leaving your computer.
  • Applying email filters may help manage unwanted emails, by automatically processing incoming messages based on certain preset criteria.
  • If the Internet connection is unusually slow or I can’t access certain sites (and that your Internet connection is not down).
  • Avoid opening email attachments, especially if they are from people you don’t know.
  • If signs of a DDoS attack appear and/or persist, contact the ISP.

 

 

Hacking

 

Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.

 

  • They find weaknesses (or pre-existing bugs) in our security settings and exploit them in order to access our information.
  • Install a Trojan horse, providing a back door for hackers to enter and search for our information.

 

 

 

 

Malware

 

Malicious software that infects our computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

 

 

  • Intimidate with ‘scareware‘, which is usually a pop-up message that tells us our computer has a security problem or other false information.
  • Reformat the hard drive of our computer causing us to lose all our information.
  • Alter or delete files on hard drive.
  • Steal private information.
  • Send emails on our behalf.

Take control of our computer and the softwares running on it.

 

Pharming

 

A means to point us to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. Copies the original site down to it’s smallest details to get us to enter our personal details.

 

Phishing

 

Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial information from us. This is also known as “spoofing”.

 

 

  • Trick us into giving them information by asking us to update, validate or confirm our account. It is often presented in a manner than seems official and intimidating, to encourage us to take action.
  • Provides cyber criminals with our usernames and passwords so that they can access our online bank account, shopping accounts, etc. and steal our credit card information.

 

 

 

Ransomware

 

Ransomware is a type of malware that restricts access to our computer or our files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection are via phishing emails that contain malicious attachments and website pop-up advertisements.

 

Two types of ransomware;

 

  • Lockscreen: displays an image that prevents us from accessing our computer.
  • Encryption ransomware: encrypts files on our system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing us from opening them

 

 

Sometimes the notification states that authorities have detected illegal activity on our computer, and that the payment is a fine to avoid prosecution.

 

Paying doesn’t help.

Regularly back-up data with a removable external storage drive.

 

 

 

Spam

 

Mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.

 

Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions.

Provide a vehicle for malware, scams, fraud and threats to your privacy.

 

 

Spoofing

 

Often used with phishing in an attempt to steal information.

 

A website or email address that is created to look like it comes from a legitimate source. An email address may even include our name, or the name of someone we know, making it difficult to discern whether the sender is real or not.

 

  • Spends spam using our email address, or a variation of our email address, to our contact list.
  • Recreates websites that closely resemble the authentic site. This could be a financial institution or other site that requires login or other personal information.

 

 

 

Spyware

 

Software that collects personal information about us without us knowing. They are usually a ‘free’ download and are installed automatically with or without your consent. They are difficult to remove and can infect a computer with viruses.

 

  • It collects information about us without us knowing about it and give it to third parties.
  • Send our usernames, passwords, surfing habits, list of applications we’ve downloaded, settings, and even the version of our operating system to third parties.
  • Change the way our computer runs without our knowledge.
  • Take us to unwanted sites or force uncontrollable pop-up ads on our screen.

 

 

Trojan Horses

 

A program that is disguised as, or embedded within, legitimate software. It is an executable (.exe) file that will install itself and run automatically once it’s downloaded.

 

 

  • Delete our files.
  • Use our computer to hack other computers.
  • Watch us through our web cam (even without turning on the light on the cam).
  • Log our keystrokes (such as a credit card numbers, passwords, etc.).
  • Record usernames, passwords and other personal information.
  • Uploading or downloading of files
  • Viewing the screen of the user
  • Wasting of computer storage and memory resources
  • Causing the computer to crash

 

 

 

Viruses

 

Computer programs that are often sent as an email attachment or a download with the intent of infecting our computer, as well as the computers of everyone in our contact list. Just visiting an insecure site can start an automatic download of a virus.

 

 

  • Send spam.
  • Provide criminals with access to our computer and contact lists.
  • Scan and find personal information like passwords on our computer.
  • Hijack our web browser.
  • Disable our security settings and antivirus programs.
  • Display unwanted ads.

 

 

When a program is running, the virus attached to it could infiltrate our hard drive and also spread to USB keys and external hard drives. Any attachment we create using this program and send to someone else could also infect them with the virus.

 

Things to check for:

  • It takes longer than usual for the computer to start up, it restarts on its own or doesn’t start up at all.
  • It takes a long time to launch a program.
  • Files and data have disappeared.
  • System and programs crash constantly.
  • The homepage set on the web browser is different (note that this could be caused by Adware that has been installed on the computer).
  • Web pages are slow to load.
  • Computer screen looks distorted.
  • Programs are running without our control.

 

 

Wi-Fi Eavesdropping

 

Virtual “listening in” on information that’s shared over an unsecure (not encrypted) WiFi network.

 

 

 

Worms

 

A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in our computer memory, doesn’t damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself.

 

 

  • Spread to everyone in our contact list.
  • Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue.

 

 

Different Network Threats

 

The majority of security professionals group the various threats to network security in one of two significant categories. They are logic attacks or resource attacks.

 

 

Logic attacks

…are famed for taking advantage of already extant vulnerabilities and bugs in programs with the stated intention of causing a system to crash. There are cyber criminals who exploit this attack with the intention of willfully gaining illegal access to the system, or alternatively of downgrading the performance of a given network.

 

 

Resource Attacks

…are primarily meant to overwhelm important system resources, like RAM and CPU resources. This is principally accomplished via dispatching numerous forged requests or IP packets to the network in question.

 

 

Keylogger

 

Keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credential such as username and password. It is also usually a sub-function of a powerful Trojan (see above).

 

 

Adware

 

Form of threat where our computer will start popping out a lot of advertisement. It can be from non-adult materials to adult materials because any ads will make the host some money. It is not really harmful threat but can be pretty annoying.

 

 

 

Backdoor

 

It’s not really a Malware, but it is a form of method where once a system is vulnerable to this method, attacker will be able to bypass all the regular authentication service. It is usually installed before any virus or Trojan infection because having a backdoor installed will ease the transfer effort of those threats.

 

 

 

Wabbits

 

It’s a self-replicating threat but it does not work like a Virus or Worms. It does not harm our system like a Virus and it does not replicate via our LAN network like a Worm. An example of Wabbit’s attack is the fork bomb, a form of DDoS attack.

 

 

Exploit

 

Exploit is a form of software which is programmed specifically to attack certain vulnerability. If our web browser is vulnerable to some out-dated vulnerable flash plugin, an exploit will work only on our web browser and plugin. The way to avoid hitting into exploit is to always patch our programs with software patches, they’re made to fix vulnerabilities.

 

 

 

Dialer

 

This threat is more existent where we still access the internet using a dial-up modem. What it does is it will make use of our internet modem to dial international numbers which are pretty costly. Today, this type of threat is more existent on Android phones because it can make use of the phone call to send SMS to premium numbers.

 

 

 

Dropper

 

Looking at the name, a Dropper is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor. There are two types of Dropper where one is to immediately drop and install to avoid Antivirus detection. Another type of Dropper is it will only drop a small file where this small file will auto trigger a download process to download the Malware.

 

 

 

Fake AV

 

Fake Antivirus threat is a very popular threat among Mac users. Due to the reason that Mac users seldom face a virus infection, scaring them with message which tells them that their computer is infected with virus is pretty useful where it results them into purchasing a bogus antivirus which does nothing.

 

 

 

Cookies

 

Cookies is not really a Malware. It is just something used by most websites to store something into our computer. It is here because it has the ability to store things into our computer and track our activities within the site. We can choose to reject using cookies for some of the sites which we do not know.

 

 

 

Bluesnarfing

 

Bluesnarfing  is all about having an unauthorized access to a specific mobile phones, laptop, or PDA via Bluetooth connection. By having such unauthorized access, personal stuff such as photos, calender, contacts and SMS will all be revealed and probably even stolen.

 

 

 

Bluejacking

 

Bluejacking is also uses the Bluetooth technology but it is not as serious as Bluesnarfing. What it does is it will connect to our Bluetooth device and send some message to another Bluetooth device. It is not as damaging to our privacy or device and system compared to Bluesnarfing.

 

 

 

 

 

Boot Sector Virus

 

It is a virus that places its own codes into computer DOS boot sector or also known as the Master Boot Record. It will only start if there it is injected during the boot up period where the damage is high but difficult to infect. All the victim need to do if they realize there is a boot sector virus is to remove all the bootable drive so that this particular virus will not be able to boot.

 

 

Browser Hijackers

 

A browser hijacker uses the Trojan Malware to take control of the victim’s web browsing session. It is extremely dangerous especially when the victim is trying to send some money via online banking because that is the best time for the hijacker to alter the destination of the bank account and even amount.

 

 

 

Mousetrapping

 

It traps our web browser to a particular website. If we try to go to another website, it will automatically redirect us back. If we try clicking forward/backward navigation buttons, it will still redirect back to it. If we close our browser and re-open it, it will set the homepage to that website and we can’t get out of this threat unless we remove it.

 

 

SQL Injection

 

SQL injection does not infect the end users directly. It is more towards infecting a website which is vulnerable to this attack. What it does is it will gain unauthorized access to the database and the attacker can retrieve all the valuable information stored in the site database.

 

There are sub-threats of these main threats. Different variations of these threats exist as well. There are over 500,000 different kinds of threats on the internet (estimated).

 

Here is a security threat list site for some interesting articles – https://securelist.com/

 

That’s the end of part 1 – Part 2 Covers some additional online safety measures for social media.

2 thoughts on “Cyber safety (This is a reeeeally long one)

Leave a comment