Page 117 - Computer - 7
P. 117

Although mobile malware is not currently as pervasive as malware that attacks traditional workstations,
          it’s a growing threat because many companies now allow employees to access corporate networks
          using their personal devices, potentially bringing unknown threats into the environment.

          Wiper Malware
          A wiper is a type of malware with a single purpose: to erase user data
          beyond recovery. Wipers are used to destroy computer networks in
          public or private companies ranging from industrial to entertainment
          sectors. Threat actors also use wipers to cover up traces left after an
          intrusion, weakening their victim’s ability to respond.


                                              Smishing
                                              Smishing is a phishing cybersecurity attack carried out over mobile
                                              text messaging, also known as SMS phishing. As a variant of phishing,
                                              victims are deceived into giving sensitive information to a disguised
                                              attacker.  SMS  phishing  can  be  assisted  by  malware  or  fraudulent
                                              websites.  It  occurs  on  many  mobile  text  messaging  platforms,
                                              including non-SMS channels like data-based mobile messaging apps.
                                              This form of attack has become increasingly popular due to the fact
          that people are more likely to trust a message that comes in through a messaging app on their phone
          than a message delivered via email.

          Vishing
          Vishing  is  a  cybercrime  that  uses  the  phone  to  steal  personal  and
          confidential  information  from  victims.  Often  referred  to  as  voice
          phishing, cyber criminals use savvy social engineering tactics to convince
          victims to act, giving up private information and access to bank accounts.
          Often, the caller will pretend to be calling from the government, tax
          department, police, or the victim’s bank.
          Like phishing or smishing, vishing relies on convincing victims that they
          are doing the right thing by responding to the caller.

          Identity Theft
          Identity theft is the act of stealing a user’s online identity, such as usernames and passwords, to pose
          as that person and send messages and emails from his online profile. Identity theft leads to social
          disrepute for a person and is intended as a malicious act.

          Data Theft
          Data Theft is the unauthorised act of copying or transfer of private data belonging to an organisation or
          an individual without their consent.
          Hacking
          Hacking  is  an  illegal  activity  that  involves  gaining  unauthorised  access  to
          computers and network resources. The person engaged in hacking activities
          is  referred  to  as  a  Hacker.  A  hacker  finds  weakness  in  computer  systems
          or  networks  and  exploits  them  to  damage  or  steal  confidential  or  private
          information.


                                                                                                             115
   112   113   114   115   116   117   118   119   120   121   122