0% found this document useful (0 votes)
119 views3 pages

Online Threats

Online threats refer to malicious acts conducted via the internet to gain unauthorized access to computer networks. This includes malware programs like viruses, trojans, worms, and spyware that can target users browsing the internet. Web threats utilize various protocols and components like email links or server attachments to spread. Common online threats are phishing, pharming, and scams. Phishing involves spoofing legitimate websites to steal user data, while pharming redirects traffic to fake sites through DNS changes. Scams use fear and urgency tactics over email, social media, phone calls and more. It is important to use strong, unique passwords, update devices, be wary of unsolicited messages, and avoid sharing personal information online to protect against

Uploaded by

ZukuchiKen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views3 pages

Online Threats

Online threats refer to malicious acts conducted via the internet to gain unauthorized access to computer networks. This includes malware programs like viruses, trojans, worms, and spyware that can target users browsing the internet. Web threats utilize various protocols and components like email links or server attachments to spread. Common online threats are phishing, pharming, and scams. Phishing involves spoofing legitimate websites to steal user data, while pharming redirects traffic to fake sites through DNS changes. Scams use fear and urgency tactics over email, social media, phone calls and more. It is important to use strong, unique passwords, update devices, be wary of unsolicited messages, and avoid sharing personal information online to protect against

Uploaded by

ZukuchiKen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ONLINE THREATS

Are a category of cyber security risk that may cause an undesirable event or action via the internet.
It's deemed any malicious act that attempts to gain access to a computer network w/ out
authorization or permission from the owners. These are usually done by computer hackers who
uses the World Wide Web to facilitate cybercrime. Online Threats are malware programs that can
target you when you're using the internet. Trojan horse, Worms, Virus, Spyware are some of the
different types of online threats. Web threats use multiple types of malwares and fraud, all of which
utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as
links in email or instant Messaging apps, or any malware attachments on servers that access the
Web.

How to protect yourself from Online Threats:

1. Use Strong Passwords


2. LOOK FOR ENCRYPTION

5. DON'T OPEN MAIL FROM STRANGERS

9. Enable Cookies on Your Web Browser Only

Pharming
What is pharming? Pharming is a type of cyberattack involving the redirection of web traffic from a
legitimate site to a fake site for the purpose of stealing usernames, passwords, financial data, and other
personal information.

There are 2 types of Pharming

1. Pharming malware aka DNS changers/hijackers


2. DNS poisoning aka DNS spoofing

How to protect against pharming

1. Create a strong password for your home Internet


4. Consider using a different DNS service
Phishing
Protect Yourself Against Phishing Scams & Identity Theft

If you receive a suspicious email. If you responded to a suspicious email. Never email your personal or
financial information. Review your credit card and bank account statements. Use caution with tax
information. Use email etiquette. Use security best practices.

Email phishing the most common form of phishing, this type of attack uses tactics like phony hyperlinks
to lure email recipients into sharing their personal information. Attackers often masquerade as a large
account provider like Microsoft or Google, or even a coworker.

Different types of phishing attacks.

Email phishing
Malware phishing
Spear phishing
Smishing

How Phishing Works

Whether a phishing campaign is targeted or sent to as many victims as possible, it starts with a malicious
email message. An attack is disguised as a message from a legitimate company. The more aspects of the
message that mimic the real company, the more likely an attacker will be successful.

Quick tips for avoiding phishing

 Don’t trust display names


 Check for typos Spelling mistakes and poor grammar
 Read the salutation
 Review the signature Check for contact information
 Beware of threats Fear-based phrases

Phishing Examples Attackers prey on fear and a sense of urgency.


Internet scams are different methodologies of Fraud, facilitated by cybercriminals on the
Internet. Scams can happen in a myriad of ways- via phishing emails, social media, SMS messages on
your mobile phone, fake tech support phone calls, scareware and more. The main purpose of these
types of scams can range from credit card theft, capturing user login and password credentials and even
identity theft.

Tips of avoiding scams

1.) Keep your computers and mobile devices up to date. ...

2.) Set strong passwords. ...

3.) Watch out for phishing scams. ...

4.) Keep personal information personal.

Hackers can use social media profiles to figure out your passwords and answer those security questions
in the password reset tools.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy