Sorry, but we all hate spam bots

Haven't registered Yet? Register Now.

X

Login

Forgot Password

Already a user? Login

X

Register On DiveAdvisor

i

Much like a facebook page - you need to first have a personal account through which you can login and manage the business page.

After creating a personal account, you will be directed to 'My Dive Shop' section where you can claim existing listing or create a new one.

Got It
i
i
By Using this Site I agree to the Terms & Conditons
Or Register With:
X

Hey there,

hopefully you are sufficiently intrigued with DiveAdvisor to become a member and see it in action


Much like a facebook page - you need to first have a personal account through which you can login and manage the business page.

After creating a personal account, you will be directed to 'My Dive Shop' section where you can claim existing listing or create a new one.

Got It


Or Register With:
By Using this Site I agree to the Terms & Conditons

Cyber Security Threats
Published
written by Shirley
0

The Curse Of The Cyber World - A List Of Cyber Security Threats

The cyber world in becoming more and more pervasive and is making the lives of people much more easy. Be it personal life or professional life, computing has enhanced all aspects of it. But as everything has its pros and cons, so does the cyber world. With increasing technologies, the threat is also amounting and hence we must have a comprehensive idea of each to judge the nature of it.

Let us look at the various cyber security threats which will be much prevalent in the coming time.

Botnets

This is an aggregation of software robots which infect a host of computers known as “Zombies”. There is usually a central controlling device which controls the zombies. These botnets go highly undetected and hence is a threat which will prevail for a time.

This usually comes in the form of spams or unauthorized links and introduces malware in the system and hence does the harmful job. This cyber security threat has paralyzed many servers and sites.

Distributed Denial of Service Attack

This type of service attack is followed by a server or a website shutting down or slowing down completely. The malicious person uses a number of zombie computers in this and at a time programs all the virtual users to login or spend spam to a particular address.

This is followed by the shutting down of the website due to the incoming amount of traffic and hence can be a hurdle for the legitimate user’sof the site. This happens because a website can talk a limited or a threshold amount of users to send request to the server for its usage, when this exceeds the site crashes creating trouble. Imagine this being a banks site where you transact services! This is a much prevalent cyber security threat.

To prevent such an attack, it is a must that you take anti-virus or install a firewall in your PC, as your system can be used as a zombie system if it has loopholes. Do not open emails of unknown people and apply an email filter if necessary.

Hacking

This is the term which signifies the action of a system being accessed by a person who is unauthorized to do so. He may come or pervade in your system installing malwares like Trojan horses which will be a gateway for other hackers to come in.

The hacker may steal your file or manipulate the settings of your account making your data vulnerable to misuse.

Malware intrusion

A malware is a common cyber security threat which is affecting the internet domain on a massive scale. The malware are the various software which infect your system and cause havoc in it. They can be in the form of virus, Trojan horses, logic bombs, worms etc.

It can send emails on your behalf or delete and manipulate your data. It can also cause your system to slow down and alter your hard drive. So be aware of such symptoms like system slowing down and files deleting by itself.

However, the threat of infection can be significantly reduced by using a quality VPN, for example, this one:

https://chrome.google.com/webstore/detail/veepn-unlimited-free-fast/majdfhpaihoncoakbjgbdhglocklcgno?hl=en

Another effective way to avoid infection is to use specialized anti-malware tools.

Pharming

Those using the most common social networking sites may have a clue as to what pharming really is. It is turning a legitimate url into a fraudulent one by copying all the contents same to same and spoofing its users. This cyber security threat fools the general public.

Imagine you have a bank account and want to access it online. You enter all your pin and account number knowing that obviously it’s a legitimate site but what you are subjected to is a spoof at its best. So be sure to check the url twice and contact your service provider in case of any anomalies. This is also an increasing amount of cyber security threat experienced by many people.

Phishing

One of the most easy to execute and perform, this malicious deed hoaxes you to consider a site legitimate and enter your personal things like your financial statements. They are executed by sending you fake emails and messages followed by the “pretending legitimate link”. You click on it, thinking its real but it is actually a trap for you.

Always be aware regarding such emails and messages and in case you have a doubt, do call your service provider and check with him.

These mentioned above are the most common cyber security threats in the every country. The internet is a boon and a curse and the things mentioned above are a curse the internet has provided. So we must be extremely cautious regarding the usage of the internet and me aware about the ways to prevent such an attack.

0




Load more comments