Most computer users are aware of the dark side of the Internet. Our online world brings issues of credit card and identity theft, junk mail and seedy content right into our homes and offices. Nowadays, the Internet has become an important tool and we are exposed to the threat of online security due to the increasing use of internet.
It has been published that over 100 million cases of identity theft have taken place since year 2005. This can happen in several ways, but it is no news that the main character in this story is the laptop. It can be lost or it can be stole, and therefore, all of the private and confidential data that we store in the laptop is lost and our personal information is being exposed to others.
More and more, data management is moving to the Internet—causing even greater security challenges. Software can have many security layers, but the data protection is only as good as the website firewall—and hackers still can get in and do damage.
Trojan horse attacks pose one of the most serious threats to computer security. Trojan horse, also known as a trojan, is a piece of malware which appears to perform a certain action but in fact performs another such as transmitting a computer virus. Trojans do not replicate like a virus, but they do leave behind a program that can be contacted by another computer. From there, they can do just about anything.
Trojans are also known as RATS (remote access trojans) and they are most often hidden in games and other small software programs that unsuspecting users download then unknowingly execute on their personal computer.
Spyware programs range from annoying to the dangerous, including keyboard loggers and screen capture applications that can steal passwords and other sensitive information. The programs are sometimes bundled in with shareware or freeware programs that can be downloaded from the Internet. Often times they claim to be helpful utilities that also carry a more sinister side.
Spyware installed on computer without users’ consent. Spyware software will monitor or controls computer use once it install on the computer. It may be used to send user pop-up ads, redirect user computer to websites, monitor the Internet surfing, or record user keystrokes, which, in turn, could lead to identity theft.
Threats today have become more complicated. They tend to use multiple vectors to spread, thus increasing their chances of infection. Once on the system, these threats tend to show little to no symptoms so they can survive undetected. Therefore, we have to be aware of all this threat and be careful to protect our data when access to Internet.