Page 117 - Computer - 7
P. 117
Although mobile malware is not currently as pervasive as malware that attacks traditional workstations,
it’s a growing threat because many companies now allow employees to access corporate networks
using their personal devices, potentially bringing unknown threats into the environment.
Wiper Malware
A wiper is a type of malware with a single purpose: to erase user data
beyond recovery. Wipers are used to destroy computer networks in
public or private companies ranging from industrial to entertainment
sectors. Threat actors also use wipers to cover up traces left after an
intrusion, weakening their victim’s ability to respond.
Smishing
Smishing is a phishing cybersecurity attack carried out over mobile
text messaging, also known as SMS phishing. As a variant of phishing,
victims are deceived into giving sensitive information to a disguised
attacker. SMS phishing can be assisted by malware or fraudulent
websites. It occurs on many mobile text messaging platforms,
including non-SMS channels like data-based mobile messaging apps.
This form of attack has become increasingly popular due to the fact
that people are more likely to trust a message that comes in through a messaging app on their phone
than a message delivered via email.
Vishing
Vishing is a cybercrime that uses the phone to steal personal and
confidential information from victims. Often referred to as voice
phishing, cyber criminals use savvy social engineering tactics to convince
victims to act, giving up private information and access to bank accounts.
Often, the caller will pretend to be calling from the government, tax
department, police, or the victim’s bank.
Like phishing or smishing, vishing relies on convincing victims that they
are doing the right thing by responding to the caller.
Identity Theft
Identity theft is the act of stealing a user’s online identity, such as usernames and passwords, to pose
as that person and send messages and emails from his online profile. Identity theft leads to social
disrepute for a person and is intended as a malicious act.
Data Theft
Data Theft is the unauthorised act of copying or transfer of private data belonging to an organisation or
an individual without their consent.
Hacking
Hacking is an illegal activity that involves gaining unauthorised access to
computers and network resources. The person engaged in hacking activities
is referred to as a Hacker. A hacker finds weakness in computer systems
or networks and exploits them to damage or steal confidential or private
information.
115