Top Five Useful Questions & Answers about Online Security

23 Jul

1. What are some of the current emerging security threats?

Some of the rising security threats include:

  • Identity Thefts

  • Phishing ,SMShing attacks, and Spam

  • Key logger, Malware Propogation

  • Hactivism / Cyber Protests

  • Advanced Persistent Threats (APT)

  • Espionage

  • Exploit Toolkits and Malware

  • Lures and Search Engine Poisoning

2. What are some of the primary misconceptions people have around Web security?

People still think that Internet security threats are the hand-job of hackers trying to make some money or name for themselves. But the fact is it has grown into an organized crime committed on a wide scale racking billions of dollars each passing year. They want to scam your money ,get your identity details to scam money from someone else, and/or make your system part of their botnet (i.e. steal your PC resources and Internet bandwidth).

3. Are mobile devices the new access point for hackers?

Smartphone and tablet users are constantly connected and less safeguarded when using a personal system. They most often shrug off mobile security solutions and carelessly publish financial and personal data on the Internet.

As per a recent survey, it was found that two-third of Smartphone users are unaware of the increasing risks posed by malware, with only 29 percent having considered securing their device and their personal data with a free or paid antivirus software.

4. When it comes to Web security, are all the browsers created equal?

All browsers and operating systems are as strong and as weak when it comes to Internet security. But hackers are more simple in this regard. They go where the money is and follow the least resistance path to get there. Thus if the most people use Microsoft Internet Explorer, then that is the browser they will target the most.

While they will target security flaws in major browsers, they also target security lapses in OS and other utility software like AdobeReader, Flash, and Apple iTunes among others. It is vital that you keep your security software, OS, software utility and apps updated.

5. What threats exist from legitimate websites that have been compromised? How can users spot these threats?

There are two major ways hackers can use legitimate websites.

  • Firstly, they hack into the site itself via security loop holes and often embed links to malware web pages into the site’s legitimate web pages.

  • Secondly, they post contents on blogs or forums of authentic websites, or even put advertisements on these websites. This content will have links to malware web pages.

Having a powerful Internet Security software will help you spot these threats. Web security software like Comodo Internet Security (CIS) will block these threats keeping you and your PC safe.

Leave a comment

Posted by on July 23, 2015 in Internet Security


Tags: ,

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: