Below you’ll find the most frequent Internet threats.
A browser tap is a malicious piece of code of vulnerable applications which may misuse your operating system with the intention to correct the Internet Browser (Internet Explorer). Additionally it’s the intention of stealing personal information or infecting your computer with viruses and malware without your knowledge.
A keylogger is a program or piece of hardware that may register the keystrokes to the mouse movements of a computer user. So also passwords.
These are viruses that spread themselves as an attachment through email. If your computer is infected it’s probable your computer also spread e-mails with viruses. Because of this you’ll be blocked by your internet provider. In addition your IP address comes on a blacklist and all of your e-mails will be blocked by servers.
Phishing is a form of Internet fraud. It is made up of defrauding people by luring them into a false (lender) site, which is a replica of the original site. Individuals — unwittingly — login using their own username and password or their credit card number. This offers the fraudster access to their own information together with all its consequences.
Misleads the consumer to pay money to eliminate threats and warnings that are fake. Frequently the fake virus scanners stay on your computer after paying. But they’re relatively easy to eliminate.
A rootkit is a set of software tools that are commonly used by hackers. After having obtained access to a (computer) system, it nestles deep in the operating system, which makes the system unstable. The main kit is rarely to eliminate, and if this succeeds, the functions of the operating system will be damaged.
Spyware is a computer program that steals information about a computer user; this information will be sent to an outside party.
Trojans don’t use a weak spot on a computer. But they’ll be downloaded by the consumer himself. Often they’re concealed in: pictures, movies, screensavers, programs, etc. This attribute can provide access to the infected computer and thus damage personal information of the consumer.
URL spoofing is mimicking the URL, for example a bank, so the user believes to go to the actual site but the truth is it’s the URL of an impostor.
Worm (computer worm)
A computer worm (or pig) is a self-replicating computer application. Worms operate independently. A worm exploits security holes, it spreads risks independently from computer to computer.