There is a world known as World Wide Web where you can find any kind stuff of your choice.
What if I told you about the dark aspect of World Wide Web! Yas there is a dangerous world where Black Hat rules.
Cyber criminals are there to use different Malware and methodologies of stealing your personal and business information. As an internet user, one must be aware of this dark aspect of World Wide Web. In today’s article, we will discuss some important malicious threats on the internet that can affect your computer in many ways. First of all, we will discuss malware and then further types of malware will be explain below in this article.
Malware is the short form of “Malicious Software,” it is an intrusive, annoying software or a program code that is used to infect computers and other electronic devices. It is available in the different form on the internet, i.e., Trojan Horse, Worms, Computer Viruses, Spyware, Adware, etc.
Below is the details of all these Malware.
Trojan Horse is a form of malware available on the internet. Sometimes you go to google and download free software, after installing this software you realized that it was actually malware
. Trojan Horse could be very dangerous for Computer and other electronic devices, it can steal your password by logging keystrokes and it can also hijack your webcam to watch and capture every move of yours.
In February 2010, a Guardian Analytics and Ponemon Institute study of 500 small businesses in the U.S. found that 55 percent of respondents experienced a fraud attack in the last 12 months.
The study reports that “…[w]ell-funded cyber criminals executed a full-scale assault on authentication, leveraging widespread infection of end-user
computers with banking Trojans to sneak into online banking accounts completely undetected.”
Attackers are there to spy on you on the internet by using different spyware software i.e Keylogger, which record every stroke of your’s from your keyboard and this they can easily steal your password and sensitive data. The recorded data is sent back to the attacker on the internet.
Also read: Top 10 Best Antiviruses for Computer
What if I told you that a software program can copy itself from one computer to another computer automatically without human interaction.! Yas it happened and a worm can send a copy of the email to your whole contact list on Gmail without your interaction.
You may also like: Top 10 Best Antiviruses for Computer
A botnet is a connection between different computers on the internet formed by a hacker using a malicious software.
An individual computer in this connection is known as “Zombie” computer.
The botnet is under the command of a “Bot master” to perform malicious activities. This could distribute a spam to the email address of each Zombie Computer. If botnet has a large number of computers then it could be used for Denial of Services attack.
The goal of a DoS attack is to bring down a web server by overloading it with access requests.
Unwanted messages in your mailbox are sometimes called Spam, it can easily take up space on your mail server. Sometimes these spam messages in your inbox contain a link which can lead you to malicious websites. Sometimes an attacker can ask for turning Two Factor Authentication off by sending a fake message thus he can easily compromise user’s account, and in some cases, it appears in the comment box of a blog and leads the user to some sort of unknown website or auto install software.
Phishing is the most comment term in the dark web nowadays. It can be a fake page to steal your sensitive information.
Sometimes you find a website on the internet which ask for your sensitive data i.e credit card numbers etc. This kind of sites could be harmful in many cases they just steal your sensitve and personal information and use it in malicious activites on internet.
Phishing method is commonly use to steal username and passwords of someone’s social account.
Rogue Security Software
Sometime while surfing the internet you may notice a pop-up that constantly forcing you for security update or alert . It
asks you to click on the link for update or for removing unwanted malicious softwres.
This could be actually Rouge Security Software, Which could be use to install a malware on your computer.
Computer virus is a small sotware which when spread from one computer system to another can cause in erasing everything on your hard drive, it could steal , currupt and delete sensitive data on the computer.
A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them.
Infecting computer programs can include as well, data files, or the boot sector of the hard drive.
Also read : Top 6 search Engines in World
Rootkit is a tool use to access administrator level access to a computer or a network of computers . It can be installed by
an attacker on your PC by exploiting a security hole in an legitimate application and thus it can record your keystrokes.
Rootkits gained notoriety when, in 2005, a security blogger discovered that a copy-protection tool inside music CDs from
Sony BMG Music Entertainment was secretly installing a rootkit when users copied the CD onto their computers. At the time,
security expert Bruce Schneier warned that the rootkit could allow a hacker to “gain and maintain access to your system and you wouldn’t know it.”
Many Popular websites such as Google and Twitter have been victims of DoS attacks by using the same methodoligies by attacker .