View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
considered a costly nuisance, spam now often contains malware.
Malware is a class of malicious software—viruses, worms, trojans, and spyware—that is designed to infect computers and systems and steal critical information, delete applications, drives and files, or convert computers into an asset for an outsider or attacker.
Denial of service attack – Malicious code that blocks service for users of a targeted system. The flood of incoming messages essentially forces the targeted system to shut down, thereby denying use by legitimate users.
Virus – a form of malware that infects computers or other electronic devices, making them unusable.
Phishing – a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDS and passwords by creating a website similar to that of a legitimate organization, then directing email traffic to the fraudulent site to harvest what should be private information for financial or political gain.
Patches – programs designed to fix software security flaws, often installed automatically to reduce end-user participation and increase ease of use.
Click fraud is a type of Internet crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link
IP SPOOFING-- It refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.
BOTNET-- A botnet is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. Botnets are usually controlled via standards based network protocols such as IRC
ATTACKS THROUGH SOCIAL NETWORKING SITES-- Photos and personal information posted are an easy target for hackers, and many users have already had their personal pages infiltrated. Norton warns against opening suspicious messages that appear to be from friends, and from giving out passwords.
"Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". The above two statements highlights the misuse of technology STEGANOGRAPHY.
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
Pharming -- H ackers lead users to bogus websites even if they’ve typed in their correct, intended URLs. Pharmers are more difficult to detect because they are not reliant upon the victim accepting a ‘bait’ message.
Shortened web addresses – users sometime are forced to clink on URLs that appear to have been shortened, they can lead to malware and infection.