![]() ![]() Spyware: Spyware is malware designed to spy on you. It disguises itself as legitimate software or is included in legitimate software that has been tampered with. Trojans: This type of malware tends to create backdoors in your security to let attackers monitor your activities remotely. It tends to replicate itself into data files, programmes or boot sector of a computer's hard drive and making the files/system inaccessible. Virus: A virus is a programme that is capable of infecting software and disabling or modifying a system’s core functionality. Clicking on unknown links or installing fake/pirated software can also lead to downloading of malicious programmes. One is running an older or pirated version of an operating system which is not safe or updated and thus vulnerable to attacks. ![]() There are various factors that can lead to the installation of malware in your system. ![]() These programmes can perform a variety of functions some of which include stealing or deleting sensitive data, modifying system’s core functionalities, and secretly tracking the victim’s activities. Malware is a malicious software that is written with the intent of compromising a system and stealing the data available on the system. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. The phishing email might contain a link which on clicking will take you to a fake web page. A victim who has received this email might think that it is from a legitimate source when in reality this email has been sent from a malicious hacker trying to steal your confidential information. For example, you receive an email from your bank saying that your ATM card has been disabled and you need to confirm your card number or your Aadhaar number to re-activate it. These emails generally try to create an urgency or panic to trick users into giving out their personal details. This kind of email appears to have come from a well-known person or organisation like your bank or company that you work for. Hackers create phishing emails through which they intend to steal your confidential information like passwords and bank account details. Phishing is a fake email masquerading as legitimate. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |