Category: Security Threats

What are Phishing emails?

Phishing refers to the process of deceiving recipients into sharing sensitive information with an unknown third party (cyber criminal). Typically in a phishing email scam, you receive an email that appears to come from a reputable organization, such as: Banks Social media (Facebook, Twitter) Online services with access to your financial information (e.g., iTunes, student […]

Read More »

Can Mobile Devices Get Malware?

The answer to that question is most definitely YES!   Thousands of mobile malware variants have been discovered since late 2010, when the first malware samples for Android and iOS devices were identified.   Today, malware researchers have discovered many more malicious apps for Android than for iOS, most likely due to Android devices allowing […]

Read More »

What is an Internet Worm?

Worms are a form of malware that replicates across the Internet or local networks. Worms differ from computer viruses because they can propagate themselves, rather than using a carrier program or file. They simply create copies of themselves and use communication between computers to spread.   The Conficker worm is an example of an Internet worm […]

Read More »

What is Hacktivism?

Hacktivism is the term used to describe hacking activity that’s typically for political and social purposes, attacking corporations, governments, organizations and individuals. Hacktivist groups may deface websites, redirect traffic, launch denial-of-service attacks and steal information to make their point.   A hacktivist group dominated headlines in 2011 with attacks on Sony, PBS, the U.S. Senate, […]

Read More »

Are you aware of Fake Antivirus Malware?

Fake antivirus malware reports non-existent threats in order to scare the user into installing malicious software and/or paying for unnecessary product registration and cleanup. Fake antivirus malware is commonly known as scareware. Typically it is installed through malicious websites and takes the form of fake online scans. Cybercriminals attract traffic to these sites by sending […]

Read More »

What is Email Malware?

Email malware refers to malware that is distributed via email. Historically, some of the most prolific virus families (e.g., Netsky or SoBig) distributed themselves as file attachments in email. These families relied on users double-clicking an attachment, which would run the malicious code, infect their machine and send itself to more email addresses from that […]

Read More »

How Does Document Malware Work?

Document malware takes advantage of vulnerabilities in applications that let you read or edit documents. By embedding malicious content within documents, hackers can exploit vulnerabilities in the host applications used for opening the documents. Common examples of document malware include specifically crafted Word, Excel and PDF documents..   The infamous data breach of RSA Security […]

Read More »

What is DNS Hijacking?

The Domain Name System (DNS) is the phone book of the Internet. It allows computers to translate website names, like www.rmonnetworks.com, into IP address numbers so that they can communicate with each other. A DNS hijacking attack changes a computer’s settings to either ignore DNS or use a DNS server that is controlled by malicious […]

Read More »

What are Denial of Service Attack?

A denial-of-service (DoS) attack prevents users from accessing a  computer or website. In a denial-of-service (DoS) attack, a hacker attempts to overload or shut down a service so that legitimate users can no longer access it. Typical DoS attacks target web servers and aim to make websites unavailable. No data is stolen or compromised, but […]

Read More »