Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information.
The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks in order to infect a web browser and device. Often, it’s very difficult to distinguish between legitimate and malicious online ads.
We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer?
Bundled Free Software Programs
Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not ma...
Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key.
Types of Ransomware
Ransomware can present itself in two forms.
Locker ransomware will encrypt the whole hard drive of the computer, essentially locking the user out of the entire system.
Crypto ransomware will only encrypt specific, seemingly important files on the computer, such as word documents, PDFs and image files.
Once the ransomware installs itself, ...
When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies.
New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now.
What can cybercriminals do with my data in the event of a banking or financial institution breach?
Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank a...