Actions to make sure that sensitive information doesn't get into the hands of cyber criminals which are used for malicious purposes. Online security can vary slightly from a very complex system to protect credit and banking information to a simple Anti-virus application used to prevent malicious programs from entering your device and corrupting it. Online security is the process of staying safe on the internet, making sure you are never put at risk when surfing the web. Although there many threats to your online security here are some of the most common and dangerous ones out there. (3)
Malware is a malicious software program or file that is designed to infect your personal devices. Malware has recently been on the rise, so Malware is currently one of the most dangerous. These programs work by stealing sensitive information from your device in order to access sensitive information for the purposes of Cyber crime. Here are just a few main types of Malicious programs that can damage your system. Viruses- A self-replicating file or program Adware - Exposes you to massive amounts of unwanted ads Spyware - Logs personal emails through keyloggers Ransomware - Encrypts or prevents you from accessing your data on device until a ransom is paid Trojans - Malicious programs built into legitimate applications Computer worms - Malware that is able to live in a device's memory, and able to attack and infect devices on the same network. (3)
Phishing is where cybercriminals attempt to deceive you into revealing personal or financial details by pretending to be a legitimate business or by threatening to pursue legal actions. Cybercriminals usually attempt to collect your data using these methods. (3)
This is another method which is similar to phishing trick you with phishing websites. Though the main difference between Phishing and Pharming is simple, pharming doesn't rely on fake messages. Instead cybercriminals attempt to redirect your browser URL address bar by taking complete control of it, redirecting you to malicious websites. (3)
Ever since the internet was a thing scammers have been using the web to exploit others, scamming for people's money. Usually scammers employ various levels of tactics, from tricking you to providing your SIN number, to fake login pages, and credentials so that your money or identity can be stolen. These scams can consist of many different types of scams but here are some of the most common methods used by cybercriminals to steal money or sensitive information. (3)