As we all know, online is a common activity nowadays. It is useful, but do all of us know how safe actually we are using this facility? Nowadays, managing online security is becoming a big challenge due with the numerous use of Internet. We as user should aware that we are disclose from online threats that may attack your computer system, personal data and privacy without your consent.
Phishing attacks
There is a most popular threat called phishing which steal consumers' personal identity data and financial account credentials through fake websites. Customers should caution with some scams sent out e-mails and they will ask to log in the fake websites. This action may disclose information about their financial accounts and their private information such as username and password. Usually, phishing messages may attack their victims from eBay, PayPal, or other online-shopping websites.
Spyware is programming that secretly gather information about a user without authorization and dispatch it to other interested parties to earn profit from that. If you simply download software that never heard before without scan all files, that is easy for u to attack by such spyware. This threat is quite similar with phishing that both of them can steal user’s personal information, such as documents, passwords, credit card numbers and bank accounts. The different is only the different way they use.
Malicious attacks
The most common form of malicious code is computer virus. Virus is a computer program that can replicate itself and change our computer settings and slow our computer down without knowledge of the computer user. This virus can spread easily by sending over a network via internet or by carrying on a removable medium such as floppy disk, CD, USB drive. The most famous example is the ”I Love You” virus which is a simple and small piece of code attached to e-mail which cause e-mail servers to overload and business to shut down email.
Hacker is a computer program that tries to break into others’ computer systems and specialized in the discovery of exploits in systems or prevented unauthorized access to systems. Using public shared computers to carry out bank transactions can be easily become a victim of hacker. Past few years, hackers have worked together with organized crime to harvest the valuable data exposed on the Internet.
Actually there are many other online threats but above is the most well-known threats. It is the time to keep yourselves safe from these threats!!!