Common Threats To All Humans
1 Ransomware
This kind of malware takes the user’s data and encrypts it with a key that is only accessible to the attacker. The data is held for ransom (hence the name), with the threat that the attacker will keep it "locked" or delete it permanently unless a ransom is paid. The ransom is typically paid in the form of Bitcoin and amounts to several hundred dollars for most users.
2. Information Theft
Cybercriminals have been trying to steal user accounts and information for years, and they're still at it to this day. What kinds of accounts are targets for thieves? The primary targets of hackers are financial accounts (banks, financial services, etc.), social media sites, or email accounts. These are popular targets because they're easy to monetize: bank accounts can be drained, and credit cards can be used for fraudulent charges.
3. Data Breaches
Data breaches occur because organizations did not handle the data they possess correctly. The causes may vary – sometimes an attacker makes inroads into an organisation’s network despite their best efforts. Other times, the target turns out to have been downright neglectful of security best practices and effectively left their data out in the open for attackers to steal.
4. Malicious Ads
Advertising on websites provides a significant amount of information about the user to the advertising networks, which are used to track and provide customised ads to the users. Privacy-conscious users may find this objectionable, as they may not want their site visits tracked across multiple sites. Some users may also find the ads themselves visually obnoxious, as well as a significant performance and bandwidth burden.
5. Remote Access Tools
Remote access tools (RATs) may frequently be thought of as tools used to attack enterprises and larger organizations, but that isn’t always the case.
6. Phishing
Is a form of fraud. Cybercriminals use email, instant messaging, or other social media to try to gather information such as login credentials by masquerading as a reputable person. Phishing occurs when a malicious party sends a fraudulent email disguised as being from an authorized, trusted source. The message's intent is to trick the recipient into installing malware on his or her device or into sharing personal or financial information.
7. Spear phishing
Is a highly targeted phishing attack. While phishing and spear-phishing both use emails to reach the victims, spear-phishing sends customized emails to a specific person. The criminal researches the target’s interests before sending the email.
8. Vishing
Is phishing using voice communication technology? Criminals can spoof calls from authorized sources using voice-over IP technology. Victims may also receive a recorded message that appears authorized. Criminals want to obtain credit card numbers or other information to steal the victim’s identity. Vishing takes advantage of the fact that people trust the telephone network.
9. Smishing
Is phishing using text messaging on mobile phones? Criminals impersonate a legitimate source in an attempt to gain the trust of the victim. For example, a smishing attack might send the victim a website link. When the victim visits the website, malware is installed on the mobile phone.
10. Whaling
Whaling is a phishing attack that targets high-profile targets within an organization such as senior executives. Additional targets include politicians or celebrities.
Recommended by LinkedIn
11. Pharming
Pharming is the impersonation of an authorized website in an effort to deceive users into entering their credentials. Pharming misdirects users to a fake website that appears to be official. Victims then enter their personal information thinking that they are connected to a legitimate site.
12. Spyware
Spyware is software that enables a criminal to obtain information about a user’s computer activities. Spyware often includes activity trackers, keystroke collection, and data capture. In an attempt to overcome security measures, spyware often modifies security settings. Spyware often bundles itself with legitimate software or with Trojan horses. Many shareware websites are full of spyware.
13. Scareware
Scareware persuades the user to take a specific action based on fear. Scareware forges pop-up windows that resemble operating system dialogue windows. These windows convey forged messages stating that the system is at risk or needs the execution of a specific program to return to normal operation. In reality, no problems exist, and if the user agrees and allows the mentioned program to execute, malware infects his or her system.
14. Adware
Adware typically displays annoying pop-ups to generate revenue for its authors. The malware may analyze user interests by tracking the websites visited. It can then send pop-up advertising relevant to those sites. Some versions of software automatically install Adware.
15. Spam
Spam (also known as junk mail) is an unsolicited email. In most cases, spam is a method of advertising. However, spam can send harmful links, malware, or deceptive content. The end goal is to obtain sensitive information such as a social security number or bank account information. Most spam comes from multiple computers on networks infected by a virus or worm. These compromised computers send out as many bulk emails as possible.
16. Man-In-The-Middle Attacks
allows attackers to eavesdrop on the communication between two targets. The attack takes place between two legitimately communicating hosts, allowing the attacker to “listen” to a conversation they should normally not be able to listen to, hence the name “man-in-the-middle.”
17. Fake Profiles
By using a fake social media profile, they are capable of copying a legitimate profile and performing small and large-scale attacks. Fake profiles can be used to mimic real public figures or even your or your friend's profiles to distribute mass malware or phishing campaigns to their followers or contacts.
18. Malicious Links and Content
Cybercriminals usually use malicious links to lure a victim into clicking through to data that is hosted on third-party sites. Exploits can be distributed on social media and used for account takeover when clicked.
19. Social Engineering
In social engineering, unsuspicious users are lured into sharing confidential or sensitive data via social media, email, or other communication channels. The messages often invoke urgency, fear, or similar emotions or interests, prompting the target to disclose confidential information, open a malicious file, or click a malicious link.