Dangers of email attachments and viruses


















One common exploit is to install a backdoor to allow the author of the worm to control that computer as part of a larger network of infected computers, or botnet. The computer can then be used by spammers to send junk email without revealing the real source of the spam. Trojan horses , or Trojans, are files or programs, which appear to be legitimate software and many times perform a useful function for unsuspecting users who download and install the file or software on their computers.

Spyware is software designed to collect information about users without their knowledge, or control their computer use. It can collect almost any type of data about a user, including personal information, user keystrokes e. However, spyware can also install additional software, change computer and Internet settings, or redirect Web browsers to other Websites. Spyware programs can be stand-alone applications or embedded in other programs and are usually hidden from users, so they can be difficult to detect.

Most spyware is installed when users download free programs, but infection can also happen if the user visits an infected Website. ActiveX controls are small programs, sometimes called "add-ons," that are used on the Internet, but mainly by the Internet Explorer browser and the Microsoft Windows operating system. They can enhance your browsing experience by allowing animation, or they can help with tasks such as installing security updates from the Microsoft Update Website.

Some Websites require you to install ActiveX controls to see the site or perform certain tasks on it. When you visit such a site, it will ask if you want to install the ActiveX control. The website that provides the ActiveX control should tell you what the control is for and provide relevant details. Unfortunately, ActiveX controls — like other programs — can also be misused. They can stop your computer from functioning correctly, collect your browsing habits and personal information without your knowledge, or can give you unwanted pop-up ads.

Email attachments are one of the most common ways that malware gets onto your mobile or computer. When you receive an email with an attachment, before you even think about opening it, you should run through this checklist in your head:.

Check if the email is definitely from a person or company you know. Attackers can subtly change, add or remove a letter or two from an email address to make it appear genuine.

Using Sarah googIemail. It can be hard to spot, so you should always be aware. Spoofing: Because email protocols lack effective mechanisms for authenticating email addresses, hackers are able to use addresses and domains that are very similar to legitimate ones, deceiving victims into believing that fraudulent emails are from a trusted individual.

Man-in-the-Middle Attacks : In these attacks, cybercriminals insert themselves between the user and the application, website, or service the victim is using. Like most malicious emails, man-in-the-middle attacks are not new. However, in recent years, hackers have found numerous ways to revive this classic attack. To make matters worse, a variety of inexpensive hacking tools are readily available that help criminals perform man-in-the-middle attacks.

This is a type of social engineering scam where an attacker sends an email to someone in the organization that has the ability to execute a financial transaction. Spam: Despite a number of ways to filter out unwanted email, spam remains a significant challenge for organizations. While ordinary spam is simply considered a nuisance, spam is also frequently used to deliver malware.

Ransomware, for example, is most commonly delivered via spam, and it behooves all organizations to carefully evaluate spam for dangerous intent. Key Loggers: In the most damaging data breaches, the criminals behind the attacks nearly always utilize stolen user credentials. One effective method criminals use to obtain IDs and passwords is a keylogger, often delivered by email when victims inadvertently click on a malicious attachment or link.

Zero-Day Exploits: A zero-day vulnerability refers to a security weakness that is unknown to the software developer. The security hole is exploited by hackers before the vendor has created a fix.

These viruses are especially dangerous because they can persist even after the primary source of the virus is removed. These viruses can infect the boot sector as well as files on a computer and can spread extremely rapidly and be very difficult to remove as a result.

Keyloggers: A keylogger is a type of spyware that, when installed on a device, enables a malicious actor to track and log the keys that the users strikes on his or her keyboard, capturing information that is typed such as personal and financial data, PIN codes and account numbers, credit card numbers, usernames, passwords, and other sensitive data without the user's knowledge. This information can be used to commit fraud or identity theft.

Polymorphic viruses: This type of virus changes its signature when it reproduces, masquerading as a different and seemingly harmless file.

These viruses are especially threatening because antivirus programs have a very hard time detecting them. Because traditional antivirus software can only blacklist a single virus variant, many programs take months to identify a single polymorphic virus. Polymorphic Viruses and Pattern Avoidance Polymorphic viruses are those which have code in them that changes how they operate, thus defeating detection by normal methods. How are Email Viruses Detected?

These methods include: Signature-based detection: Traditional antivirus software relies heavily on signature-based detection to identify viruses and malware. In this method, each time a new malware variant is discovered and arrives in the hands of an antivirus company, a signature of the file is extracted and added to the signatures database of the antivirus software.

This approach has its limitations, as threat actors have tried to outsmart signature-based antivirus software by creating advanced viruses which modify themselves as a method of disguise to avoid matching existing virus signatures.

Heuristics: Heuristic analysis is a popular and effective method for detecting previously unknown viruses, as well as new variants of viruses already in the wild by examining code for suspicious properties.

This technique determines the susceptibility of a system to a particular threat using various weighing methods or decision rules. Heuristics analysis is one of the few methods capable of identifying polymorphic viruses. Real-time protection: Real-time protection refers to the automatic protection provided by many antivirus and anti-malware programs, which monitors systems for suspicious activity.

Depending on the actions logged, antivirus engines that utilize this technique can determine whether a program is malicious or not. This technique has proven to be highly effective, but is rarely used in end-user antivirus solutions due to its slowness.

Data mining techniques: In this relatively new approach to virus and malware detection, data mining and machine learning algorithms are used to classify the behavior of a file and determine whether it is malicious or benign depending on a series of features that are extracted from the file.



0コメント

  • 1000 / 1000