Nowadays, everyone uses the internet more than frequently to do various things such as downloading, online shopping and watching movies (etc). With this in mind, this gives hackers the incentive to infect users, in order to cause data loss or stolen identity. Therefore, people need to be aware of the dangers that the internet has which includes viruses, hackers (Types) and ways of password retrieval.
For starters, viruses are commonly spread through the internet via downloaded files or emails.
The different types of viruses include malware, spyware, viruses, and worms.
Malware is software that is installed on your computer without consent which has intent to damage. The most dangerous one which seems to be infecting and blackmailing a lot of people is a type of malware called ransomware.
Ransomware is a type of malware which blocks access to the computer and infects it. It demands a ransom be paid to the creator in order for the restrictions to be lifted. Such cases is where the malware creates a FBI warning, stating that ‘you have child pornography’ and insisting a fee be paid in order for you not to be convicted. Furthermore, another case is where it encrypts your personal files, and forces you to pay or else you won’t be able to access your ‘files again period’. Even if you remove the virus itself the damage would already be done.
Picture of Ransomware malware claiming person has been viewing phonographic content.
Most people have the impression that once you have an antivirus program, you are totally safe. This is false as no antivirus is totally effective against viruses.
Secondly, hackers are persons who try to gain unauthorized access to your computer through vulnerabilities (backdoors) on your computer. The three types of hackers are Black, White, and Gray Hat.
Types Of Hackers.
White hats are the “good guys” who find vulnerabilities; Black Hats are those who use the findings for their own personal gain for example, viruses or hacking. Gray Hats are those who do a mixture of both good and bad. There are various hacking groups out there that help the internet. However, there are some who do nothing but bad.
Lastly with respect to hacking, there are several ways in which a hacker can get your password that does not require special skills. The most common ones are Password Cracking, Key logger and Web Spoofing.
Password cracking is simply guessing common passwords that you may think the person uses often. However, this method can take hours; even days depending on your target.
A key logger is software than can be used to record user activities like their credit cards or passwords (this one is dangerous as most times the user is not aware that their information is being recorded and transmitted to the author of the key logger).
Last but not least, is Web spoofing, which is where the URL(Universal Resource Locater) or address of a website is cloned in order for the user to think that he or she is going to a particular site when actually they are not. For example, with Facebook you can trick the user by creating a fake login page. With this method, when the user tries to login, their email address and password will be captured and sent to the person who created the spoof URL.
How Web Spoofing Works.
As with these dangers the best protection is to avoid suspicious websites or clicking links, install all Operating System updates and ensure that your antivirus program is up to date. However it is always wise to make “backups” of your files as you never know what can happen in a second.