ONLINE THREATS
Are a category of cyber security risk that may cause an undesirable event or action via the internet.
It's deemed any malicious act that attempts to gain access to a computer network w/ out
authorization or permission from the owners. These are usually done by computer hackers who
uses the World Wide Web to facilitate cybercrime. Online Threats are malware programs that can
target you when you're using the internet. Trojan horse, Worms, Virus, Spyware are some of the
different types of online threats. Web threats use multiple types of malwares and fraud, all of which
utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as
links in email or instant Messaging apps, or any malware attachments on servers that access the
Web.
How to protect yourself from Online Threats:
1. Use Strong Passwords
2. LOOK FOR ENCRYPTION
5. DON'T OPEN MAIL FROM STRANGERS
9. Enable Cookies on Your Web Browser Only
Pharming
What is pharming? Pharming is a type of cyberattack involving the redirection of web traffic from a
legitimate site to a fake site for the purpose of stealing usernames, passwords, financial data, and other
personal information.
There are 2 types of Pharming
1. Pharming malware aka DNS changers/hijackers
2. DNS poisoning aka DNS spoofing
How to protect against pharming
1. Create a strong password for your home Internet
4. Consider using a different DNS service
Phishing
Protect Yourself Against Phishing Scams & Identity Theft
If you receive a suspicious email. If you responded to a suspicious email. Never email your personal or
financial information. Review your credit card and bank account statements. Use caution with tax
information. Use email etiquette. Use security best practices.
Email phishing the most common form of phishing, this type of attack uses tactics like phony hyperlinks
to lure email recipients into sharing their personal information. Attackers often masquerade as a large
account provider like Microsoft or Google, or even a coworker.
Different types of phishing attacks.
Email phishing
Malware phishing
Spear phishing
Smishing
How Phishing Works
Whether a phishing campaign is targeted or sent to as many victims as possible, it starts with a malicious
email message. An attack is disguised as a message from a legitimate company. The more aspects of the
message that mimic the real company, the more likely an attacker will be successful.
Quick tips for avoiding phishing
Don’t trust display names
Check for typos Spelling mistakes and poor grammar
Read the salutation
Review the signature Check for contact information
Beware of threats Fear-based phrases
Phishing Examples Attackers prey on fear and a sense of urgency.
Internet scams are different methodologies of Fraud, facilitated by cybercriminals on the
Internet. Scams can happen in a myriad of ways- via phishing emails, social media, SMS messages on
your mobile phone, fake tech support phone calls, scareware and more. The main purpose of these
types of scams can range from credit card theft, capturing user login and password credentials and even
identity theft.
Tips of avoiding scams
1.) Keep your computers and mobile devices up to date. ...
2.) Set strong passwords. ...
3.) Watch out for phishing scams. ...
4.) Keep personal information personal.
Hackers can use social media profiles to figure out your passwords and answer those security questions
in the password reset tools.