Understanding Vulnerabilities
Phishing IQ
Have you ever wonder how many of the emails you receive are phishing emails?
You may have realized that many times the fake lottery ticket, or an email from IRS is fake - a phishing e-mail. Test your self with the IQ test from the creators of the Sonicwall firewalls (DeLL).
How is your Phishing IQ?
Virus
A computer virus is a small piece of code written to alter the way a computer operates, without the permission or knowledge of the user.
A computer virus must meet two criteria:
It must execute itself.
It must replicate itself.
Computer Virus?
Worm
Worms are programs that replicate themselves from system to system without the use of a host file.
Worms generally exist inside of other files, often documents. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm.
Trojan Horse
Trojan horses are impostors--files that claim to be something desirable but, in fact, are malicious. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in effect, invite these programs onto your computers by opening an email attachment.
Trojan Horse?
Apple Syndrome
Perhaps, one of the biggest complacency risks out there is the “Apple syndrome” - as in, “I’m not at risk of malware because I use a Mac.”
Many users believe that their Apple device is immune to the viruses; however, this is a myth.
Although the number if viruses targeting a mac operating system platform is fewer than PC platform, macs also get viruses and they can get damaged.
Ransomware
For the past few years a trend overtook the business market - ransomware attacks. They have taken place more often because employers failed to educate and train their employees.
In these attacks a malicious piece of software, sent by a criminal, takes over your files and encrypts those with a secret key. Afterwards it displays a message asking for most common cryptocurrency to give you back your files.
Ransomware Prevention
Attacks
Many users do not consider themselves as a high target. however ransomware can sit on your device for a long time and the get activated at work when you take your own device to work.
Even if you connected to a wireless network, the ransomware can use your network connection and spread across the network.
Live Security Attacks