≡ Menu

Top 5 Digital Security Threats

Internet and e-mail has become part of our life, as so the dangers and risks associated with it. In 1990’s main threat were from viruses and worms. But in recent years, biggest threat faced by computers is crimeware by Terrorists and criminals. Crimeware may take the form of viruses, worms, Trojans or other malicious programs.

At the conclusion of its annual summit on emerging security threats and countermeasures affecting the digital world, Georgia Tech Information Security Center (GTISC) Report—outlined the top five information security threats and challenges facing both consumer and business users in 2009. There are

  • Malware
  • Botnets
  • Cyber warfare
  • Threats to VoIP and mobile devices
  • The evolving cyber crime economy

Malware

Software developed for the purpose of causing harm to a computer system, such as a virus or a Trojan horse. These are the software that can destroy your data, effect your computer’s performance, cause a crash, or even allow spammers to send email through your account.
Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software.

Botnets

Botnet is a jargon term for a collection of software robots, or bots, that run autonomously and automatically. This is term is associated with Malware software. It is a collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-and-control infrastructure.

Cyber warfare

Cyber-warfare, also known as cyberwar is a relatively new type of weaponry in conducting warfare in cyberspace. It doesn’t have any limitations of use and can achieve most of the goals set.

There are several methods of attack in cyber warfare, including web vandalism, propaganda, gathering data, distributed denial-of-service attacks, equipment disruption, attacking critical infrastructure, compromised counterfeit hardware

Threats to VoIP and mobile devices

Since Voice over Internet Protocol telephone systems (VoIP) are computer-based technology, Hackers who know about these vulnerabilities can institute DoS (denial of service) Attacks on VoIP Networks, VoIP Eavesdropping, Vishing by VoIP, VoIP Attacks Against Service Providers.

Cyber Crime Economy

Underground cyber crime economy is booming. According to informationweek a report, Cybercriminals make so much money, in fact, that they employ money mules, networks of thousands of people to help them launder money by receiving and sending cash for a commission. Many of them are unaware that they’re facilitating crime. And many of them end up being scammed.

{ 5 comments… add one }

Leave a Comment