8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | Edureka
Summary
TLDRThe video discusses eight significant cybersecurity threats, including malware, phishing, password attacks, DDoS attacks, man-in-the-middle attacks, drive-by downloads, malvertising, and rogue software. Each threat is outlined with an explanation of how it functions and provides insights into protective measures. The video emphasizes the critical nature of cybersecurity awareness, detailing specific strategies like maintaining up-to-date software, recognizing phishing attempts, employing strong password practices, and utilizing secure connections. By educating viewers on these threats, the video aims to enhance understanding and security in an increasingly interconnected digital landscape.
Takeaways
- 🛡️ Cybersecurity awareness is crucial for individuals and businesses.
- 💻 Malware is a significant threat that can cause data breaches.
- 📧 Phishing attacks often pose as legitimate requests for personal information.
- 🔑 Protect your passwords using strong, non-dictionary based phrases.
- 🚀 DDoS attacks aim to overload services, causing disruptions.
- 🔍 Man-in-the-middle attacks can compromise sensitive communications.
- 🌐 Drive-by downloads exploit unpatched security flaws on websites.
- 📢 Malvertising involves infected ads that can harm devices.
- 🔍 Rogue software tricks users into paying for fake virus protection.
Timeline
- 00:00:00 - 00:05:00
The session introduces cybersecurity threats, highlighting the correlation between increased internet connectivity and the rise of cyber vulnerabilities. It sets the stage for discussing eight common cybersecurity threats and their prevention methods, emphasizing the need for education on these attacks.
- 00:05:00 - 00:10:00
The video showcases real-time examples of ongoing cyber attacks using Threat Cloud, illustrating the global scale of cybercrime. It begins with malware, explaining its various forms, including viruses, Trojans, and worms, detailing how they infiltrate systems and emphasizing the importance of security measures such as updated firewalls and operating systems to combat malware.
- 00:10:00 - 00:15:00
Next, phishing is defined as deceptive attacks that mimic legitimate requests for personal data, often through emails. The process of phishing is broken down into planning, execution, and theft of information. Awareness of phishing characteristics is essential for prevention, including scrutinizing email sources and avoiding suspicious links.
- 00:15:00 - 00:22:04
Password attacks are explored as attempts to gain unauthorized access through methods like brute-force attacks and keylogging. The segment outlines how password vulnerabilities can lead to serious breaches, urging the use of strong, non-dictionary-based passwords and multi-factor authentication to enhance security measures.
Mind Map
Video Q&A
How can you safeguard against man-in-the-middle attacks?
Using encrypted connections and VPNs helps protect against these attacks.
What preventative measures can help against these cybersecurity threats?
Regularly update software, use firewalls, and maintain strong passwords.
View more video summaries
- 00:00:00[Music]
- 00:00:06just as pollution was a side effect of
- 00:00:09the Industrial Revolution so are the
- 00:00:11many security vulnerabilities that come
- 00:00:13with the increased Internet connectivity
- 00:00:14cyber attacks are exploitations of those
- 00:00:17vulnerabilities for the most part
- 00:00:19individuals and businesses have found
- 00:00:21ways to counter cyber attacks using a
- 00:00:23variety of security measures and just
- 00:00:26good old common sense hi guys my name is
- 00:00:28Aria and today's session is all about
- 00:00:30cyber security threats we are going to
- 00:00:32examine eight of the most common cyber
- 00:00:34security threats that your business
- 00:00:36could face and the ways to avoid them so
- 00:00:39before we actually jump into the session
- 00:00:40let me give you how the session will
- 00:00:42actually work we are going to discuss
- 00:00:44the most eight common cyber threats
- 00:00:46we're going to discuss in particular
- 00:00:47what they are how the threat works and
- 00:00:49how to protect yourself okay so now
- 00:00:52let's jump in now cyber attacks are
- 00:00:54taking place all the time even as we
- 00:00:56speak
- 00:00:57the security of some organization big or
- 00:00:59small is being compromised for example
- 00:01:02if you visit the site out here that is
- 00:01:04threat cloud you can actually view all
- 00:01:06the cyber attacks that are actually
- 00:01:08happening right now let me just give you
- 00:01:10a quick demonstration of how that looks
- 00:01:12like okay so as you guys can see out
- 00:01:14here these are all the places that are
- 00:01:17being compromised right now the red
- 00:01:18parts actually show us the part that is
- 00:01:21being compromised and the yellow places
- 00:01:24actually show us from where it's being
- 00:01:26compromised strong ok as you guys can
- 00:01:28see now that someone from the
- 00:01:30Netherlands is actually attacking this
- 00:01:32place and someone from USA was attacked
- 00:01:34in Mexico it's a pretty interesting site
- 00:01:36and actually gives you a scale of how
- 00:01:38many cyber attacks are actually
- 00:01:39happening all the time in the world
- 00:01:41ok now getting back I think looking at
- 00:01:43all these types of cyber attacks it's
- 00:01:45only necessary that we educate ourselves
- 00:01:47about all the types of cyber threats
- 00:01:49that we have so these are the 8 cyber
- 00:01:52threats that we are going to be
- 00:01:53discussing today firstly we're going to
- 00:01:55start with malware so malware is an
- 00:01:58all-encompassing term for a variety of
- 00:02:00cyber attacks including Trojans viruses
- 00:02:03and bombs malware is simply defined as
- 00:02:06code with malicious intent that
- 00:02:08typically steals data or destroy
- 00:02:10something on the computer the way
- 00:02:12malware
- 00:02:13about doing its damage can be helpful in
- 00:02:15categorizing what kind of malware you
- 00:02:17are dealing with so let's discuss it so
- 00:02:19first of all viruses like the biological
- 00:02:22namesakes viruses attach themselves to
- 00:02:24clean files and infect other clean files
- 00:02:26and they can spread uncontrollably
- 00:02:27damaging a systems core functionality
- 00:02:30and deleting or corrupting files they
- 00:02:32usually appear as executable file is
- 00:02:34that you might have downloaded from the
- 00:02:35internet then there are also Trojans now
- 00:02:37this kind of malware disguises itself as
- 00:02:40legitimate software or is included in
- 00:02:42legitimate software that can be tampered
- 00:02:44with it tends to act as creat lis and
- 00:02:46creates backdoors in your security to
- 00:02:48let other malware sin' then we have
- 00:02:50worms worms in fact entire networks of
- 00:02:53devices either local or across the
- 00:02:55internet by using the network's
- 00:02:56interfaces it uses each consecutive
- 00:02:59infected machine to infect more and then
- 00:03:01we have botnets and such where botnets
- 00:03:03are networks of infected computers that
- 00:03:05are made to work together under the
- 00:03:07controller of an attacker so basically
- 00:03:09you can encounter malware if you have
- 00:03:11some OS vulnerabilities or if you
- 00:03:13download some L legitimate software from
- 00:03:15somewhere or you have some other email
- 00:03:17attachment that was compromised with
- 00:03:20okay so how exactly do you remove
- 00:03:22malware or how exactly do you fight
- 00:03:24against it well each form of malware has
- 00:03:27its own way of infecting and damaging
- 00:03:29computers and data and so each one
- 00:03:31requires a different malware removal
- 00:03:32method the best way to prevent malware
- 00:03:35is to avoid clicking on links or
- 00:03:36downloading attachments from unknown
- 00:03:38senders and this is sometimes done by
- 00:03:40deploying a robust and updated firewall
- 00:03:42which prevents the transfer of large
- 00:03:44data files over the network in a hope to
- 00:03:46weed out attachments that may contain
- 00:03:48malware it's also important to make sure
- 00:03:50your computer's operating system whether
- 00:03:52it be Windows Mac OS Linux uses the most
- 00:03:55up-to-date security updates and software
- 00:03:57programmers update programs frequently
- 00:03:59to address any holes or weak points and
- 00:04:02it's important to install all these
- 00:04:03updates as well as to decrease your own
- 00:04:05system weaknesses so next up on our list
- 00:04:08of cyber threats we have phishing
- 00:04:10so what exactly is phishing well often
- 00:04:13posing as a request for data from a
- 00:04:15trusted third party phishing attacks are
- 00:04:18sent via email and ask users to click on
- 00:04:20a link and enter their personal data
- 00:04:22phishing emails have gotten much more
- 00:04:25sophisticated in recent
- 00:04:26and making it difficult for some people
- 00:04:28to discern a legitimate request for an
- 00:04:31information from a false one
- 00:04:33now phishing emails often fall into the
- 00:04:35same category as spam but are way more
- 00:04:37harmful than just a simple ad so how
- 00:04:40exactly does phishing book well most
- 00:04:43people associate phishing with email
- 00:04:45message that spoof or mimic bank credit
- 00:04:48card companies or other businesses like
- 00:04:50Amazon eBay and Facebook these messages
- 00:04:53look authentic and attempt to get
- 00:04:55victims to reveal their personal
- 00:04:56information but email messages are only
- 00:04:59one small piece of a phishing scam from
- 00:05:01beginning to end the process involves
- 00:05:03five steps the first step is planning
- 00:05:05the fissure must decide which business
- 00:05:07to target and determine how to get email
- 00:05:09addresses for the customers of that
- 00:05:11business then they must go through the
- 00:05:14setup phase once they know which
- 00:05:16business to spoof and who their victims
- 00:05:18are Fisher's create methods for
- 00:05:20delivering the messages and collecting
- 00:05:21the data then they have to execute the
- 00:05:23attack and this is the step most people
- 00:05:26are familiar with that is the Fisher
- 00:05:27sends the phony message that appears to
- 00:05:29be from a reputable source
- 00:05:31after that the Fisher records the
- 00:05:33information the victims enter into the
- 00:05:35webpage or pop-up windows and in the
- 00:05:37last step which is basically identity
- 00:05:39theft and fraud the Fisher's use the
- 00:05:41information they've gathered to make
- 00:05:42illegal purchases or otherwise commit
- 00:05:44fraud and as many as 1/4 of the victims
- 00:05:47never fully recover so how exactly can
- 00:05:50you be actually preventing yourself from
- 00:05:52getting fished well the only thing that
- 00:05:55you can do is being aware of how
- 00:05:56phishing emails actually work so first
- 00:05:59of all a phishing email has some very
- 00:06:01specific properties so firstly you will
- 00:06:04have something like a very generalized
- 00:06:06way of addressing someone like your
- 00:06:07client then your message will not be
- 00:06:11actually from a very reputable source so
- 00:06:13out here as you can see it's written as
- 00:06:16Amazon on the label but if you actually
- 00:06:18inspect the email address that it came
- 00:06:20from its from management at maison
- 00:06:22canada dot CA which is not exactly your
- 00:06:24legitimate Amazon address third you can
- 00:06:26actually hover over the redirect links
- 00:06:29and see where they actually redirect you
- 00:06:30to now this redirects me to wwf/e
- 00:06:34amazon.com as you can see out here so
- 00:06:37basically you know this is actually a
- 00:06:39phishing
- 00:06:40and you should actually report this
- 00:06:42email to your administrators or anybody
- 00:06:44else that you think is supposed to be
- 00:06:46concerned with this also let me give you
- 00:06:48guys a quick demonstration on how
- 00:06:50phishing actually works from the
- 00:06:52perspective of an attacker so first of
- 00:06:56all I have actually created a phishing
- 00:06:59website for harvesting Facebook
- 00:07:01credentials I simply just took the
- 00:07:05source code of the facebook login page
- 00:07:07and pasted it and then made a back-end
- 00:07:09code in PHP which makes a log file of
- 00:07:12all the Facebook passwords that get
- 00:07:15actually entered onto the phishing page
- 00:07:16now I've also sent myself an email as to
- 00:07:20make sure this looks legitimate but this
- 00:07:23is only for spreading awareness so
- 00:07:25please don't use this method for
- 00:07:26actually harvesting credentials that's
- 00:07:29actually a very legal thing to do so
- 00:07:31let's get started first of all you will
- 00:07:33go to your email and see that you get
- 00:07:36some email saying the our Facebook
- 00:07:38credentials has been compromised
- 00:07:39so when you open it it looks pretty
- 00:07:42legit well I haven't made it look all
- 00:07:44that legit it should look legit but the
- 00:07:47point out here is to actually make you
- 00:07:48aware of how this works
- 00:07:49so as you guys can see it says dear
- 00:07:51client we have strong reasons to believe
- 00:07:53that your credentials may have been
- 00:07:54compromised and might have been used by
- 00:07:56someone else we have locked your
- 00:07:58Facebook account please click here to
- 00:08:00unlock sincerely Facebook associate team
- 00:08:03so if we actually click here we are
- 00:08:06actually redirected to a nice-looking
- 00:08:09Facebook page which is exactly how
- 00:08:11Facebook looks like when you're logging
- 00:08:13in now suppose I were to actually log in
- 00:08:16to my Facebook account which I won't
- 00:08:18I'll just use some random ID like this
- 00:08:20is an email address email com and let's
- 00:08:25put password as admin one two three and
- 00:08:28we click login now since my facebook is
- 00:08:32actually already logged in it'll just
- 00:08:34redirect to facebook.com and you might
- 00:08:36just see me logged in but on a normal
- 00:08:38computer it'll just redirect you to
- 00:08:40www.facebook.com which should just show
- 00:08:43this site again okay so once I click log
- 00:08:46in out here all that the backend code
- 00:08:48that I've written in PHP out here will
- 00:08:50do
- 00:08:51is that it's gonna take all the
- 00:08:54parameters that have entered into this
- 00:08:55website that is my email address and
- 00:08:58password and just generate a log file
- 00:09:00about so let's just hit login and see
- 00:09:02what happens so as you guys can see I've
- 00:09:04been redirected to the original Facebook
- 00:09:07page that is not meant for phishing and
- 00:09:09on my system out here I have a log file
- 00:09:14and this log file will show exactly as
- 00:09:17you can see I've fished out the email
- 00:09:19address this is an email address email
- 00:09:21comm and it's also showed the password
- 00:09:23that is admin one two three so this is
- 00:09:26how exactly phishing works you enter an
- 00:09:28email address and you're entering the
- 00:09:31email address on a phishing website and
- 00:09:33then it just redirects you to the
- 00:09:35original site but by this time you've
- 00:09:37already compromised your credentials so
- 00:09:39always be careful when dealing with such
- 00:09:41emails so now jumping back to our
- 00:09:43session the next type of cyber attacks
- 00:09:45we are going to discuss is pass with the
- 00:09:47docs so an attempt to obtain or decrypt
- 00:09:50a user's password for illegal use is
- 00:09:53exactly what a password attack is
- 00:09:55hackers can use cracking programs
- 00:09:57dictionary attacks and password sniffers
- 00:09:59and password attacks password cracking
- 00:10:01refers to various measures used to
- 00:10:03discover computer passwords this is
- 00:10:05usually accomplished by recovering
- 00:10:07passwords from data stored in or
- 00:10:09transported from a computer system
- 00:10:10password cracking is done by either
- 00:10:13repeatedly guessing the password usually
- 00:10:15through a computer algorithm in which
- 00:10:16the computer tries numerous combinations
- 00:10:18until the password is successfully
- 00:10:20discovered now password attacks can be
- 00:10:22done for several reasons but the most
- 00:10:24malicious reason is in order to gain
- 00:10:26unauthorized access to a computer with
- 00:10:28the computer's owners awareness not
- 00:10:30being in place now this results in
- 00:10:32cybercrime such as stealing passwords
- 00:10:34for the purpose of accessing bank
- 00:10:36information now today there are three
- 00:10:38common methods used to break into a
- 00:10:40password-protected system the first is a
- 00:10:42brute-force attack a hacker uses a
- 00:10:44computer program or script to try to log
- 00:10:47in with possible password combinations
- 00:10:49usually starting with the easiest to
- 00:10:50guess password so just think if a hacker
- 00:10:52has a company list he or she can easily
- 00:10:55guess user names if even one of the
- 00:10:57users has a password one two three he
- 00:10:59will quickly be able to get in the next
- 00:11:01our dictionary attacks now a hacker uses
- 00:11:03a program or script
- 00:11:05try to login by cycling through the
- 00:11:06combinations of common woods in contrast
- 00:11:09with brute-force attacks where a large
- 00:11:10proportion key space is searched
- 00:11:12systematically a dictionary attack try
- 00:11:15is only those possibilities which are
- 00:11:17most likely to succeed
- 00:11:18typically derive from a list of words
- 00:11:20for example a dictionary generally
- 00:11:22dictionary attacks succeed because most
- 00:11:24people have a tendency to choose
- 00:11:26passwords which are short or such as
- 00:11:29single words found in the dictionaries
- 00:11:30or simple easy predicted variations on
- 00:11:32words such as appending a digit also now
- 00:11:35the last kind of password attacks are
- 00:11:37used by keylogger attacks a hacker uses
- 00:11:40a program to track all of the user's
- 00:11:41keystrokes so at the end of the day
- 00:11:43everything the user has typed including
- 00:11:45the login IDs and passwords have been
- 00:11:47recorded a key logger attack is
- 00:11:49different than a brute-force or
- 00:11:50dictionary attack in many ways not the
- 00:11:52least of which the key login program
- 00:11:55used is a malware that must first make
- 00:11:57it onto the user's device and the key
- 00:12:00logger attacks are also different
- 00:12:01because stronger passwords don't provide
- 00:12:03much protection against them which is
- 00:12:05one reason that multi-factor
- 00:12:06authentication is becoming a must-have
- 00:12:08for all businesses and organizations now
- 00:12:11the only way to stop yourself from
- 00:12:13getting killed in the whole password
- 00:12:15attack conundrum is by actually
- 00:12:17practicing the best practices that are
- 00:12:19being discussed in the whole industry
- 00:12:21about passwords so basically you should
- 00:12:23update your password regularly you
- 00:12:25should use alpha numerics in your
- 00:12:27password and you should never use words
- 00:12:29that are actually in the dictionary it's
- 00:12:30always advisable to use garbage words
- 00:12:33that makes no sense for passwords as
- 00:12:35they just increase your security so
- 00:12:38moving on we're going to discuss DDoS
- 00:12:40attacks so what exactly is a DDoS or a
- 00:12:44DOS attack well first of all it stands
- 00:12:47for distributed denial of service and a
- 00:12:50dos attacks focuses on disrupting the
- 00:12:52service to a network as the name
- 00:12:53suggests attackers send high volume of
- 00:12:55data of traffic through the network
- 00:12:57until the network becomes overloaded and
- 00:12:59can no longer function so there are a
- 00:13:01few different ways attackers can achieve
- 00:13:03dos attack but the most common is the
- 00:13:05distributed denial of service attack
- 00:13:07this involves the attacker using
- 00:13:09multiple computers to send the traffic
- 00:13:11or data that will overload the system in
- 00:13:13many instances a person may not even
- 00:13:16realize that his or her computer has
- 00:13:18been hijacked and a
- 00:13:19contributing to the DOS attack now
- 00:13:21disrupting services can have serious
- 00:13:23consequences relating to security and
- 00:13:25online access many instances of
- 00:13:27large-scale dos attacks have been
- 00:13:28implemented as a single sign of protests
- 00:13:31towards governments or individuals and
- 00:13:33have led to severe punishment including
- 00:13:34major jail time so how can you prevent
- 00:13:37dos attacks against yourself well
- 00:13:40firstly unless your company is huge it's
- 00:13:42rare that you would be even targeted by
- 00:13:44an outside group or attackers for a DOS
- 00:13:46attack your site or network could still
- 00:13:48fall victim to one however if another
- 00:13:50organization on your network is targeted
- 00:13:52now the best way to prevent an
- 00:13:54additional breach is to keep your system
- 00:13:56as secure as possible with regular
- 00:13:58software updates online security
- 00:14:00monitoring and monitoring of your data
- 00:14:02flow to identify any unusual or
- 00:14:04threatening spikes in traffic before
- 00:14:06they become a problem
- 00:14:07dos attacks can also be perpetrated by
- 00:14:10simply cutting a table or dislodging a
- 00:14:12plug that connects your website server
- 00:14:14to the Internet so due diligence in
- 00:14:16physically monitoring your connections
- 00:14:18is recommended as well okay so next up
- 00:14:21on a list is man-in-the-middle attacks
- 00:14:23so by impersonating the endpoints in an
- 00:14:28online information exchange the
- 00:14:30man-in-the-middle attack can obtain
- 00:14:31information from the end user and the
- 00:14:33entity he or she is communicating with
- 00:14:36for example if you are banking online
- 00:14:39the man in the middle would communicate
- 00:14:40with you by impersonating your bank and
- 00:14:43communicate with the bank by
- 00:14:44impersonating you the man in the middle
- 00:14:46would then receive all of the
- 00:14:48information transferred between both
- 00:14:49parties which could include sensitive
- 00:14:51data such as bank accounts and personal
- 00:14:53information so how does it exactly work
- 00:14:56normally an MIT M gains access through a
- 00:14:59non encrypted wireless access point
- 00:15:01which is basically one that doesn't use
- 00:15:04WEP WPA or any of the other security
- 00:15:06measures then they would have to access
- 00:15:09all the information being transferred
- 00:15:11between both parties by actually
- 00:15:13spoofing something called address
- 00:15:15resolution protocol that is the protocol
- 00:15:17that is used when you are actually
- 00:15:19connecting to your gateway from your
- 00:15:20computer so how can you exactly prevent
- 00:15:23MIT M attacks from happening against you
- 00:15:25firstly you have to use an encrypted W
- 00:15:28AP that is an encrypted wireless access
- 00:15:30point
- 00:15:32next you should always check the
- 00:15:33security of your connection because when
- 00:15:36somebody is actually trying to
- 00:15:37compromise your security he will try to
- 00:15:39actually strip down the SC DPS or SSDs
- 00:15:42that is being injected in the website
- 00:15:44which is basically the security
- 00:15:46protocols so if something like this
- 00:15:48HTTPS is not appearing in your website
- 00:15:50you're on an insecure website where your
- 00:15:52credentials or your information can be
- 00:15:54compromised and the last and final
- 00:15:57measure that you can actually use is by
- 00:15:59investing in a virtual private network
- 00:16:01which spoofs your entire IP and you can
- 00:16:04just browse the Internet
- 00:16:05with perfect comfort next up on our list
- 00:16:08is drive-by downloads so gone are the
- 00:16:11days where you have to click to accept a
- 00:16:13download or install a software update in
- 00:16:15order to become infected
- 00:16:16now just opening a compromised webpage
- 00:16:19could allow dangerous code to install on
- 00:16:22your device you just need to visit or
- 00:16:24drive by a webpage without stopping or
- 00:16:27to click accept any software add the
- 00:16:29malicious code can download in the
- 00:16:31background to your device a drive-by
- 00:16:33download refers to the unintentional
- 00:16:35download of a virus or malicious
- 00:16:37software onto your computer or mobile
- 00:16:39device a drive-by download will usually
- 00:16:41take advantage or exploit a browser or
- 00:16:44app or operating system that is out of
- 00:16:45date and has security flaws this initial
- 00:16:48code that is downloaded it is often very
- 00:16:50small and since this job is often simply
- 00:16:53to contact another computer of where it
- 00:16:55can pull down the rest of the code onto
- 00:16:56your smartphone tablet or other
- 00:16:58computers often a web page will contain
- 00:17:01several different types of malicious
- 00:17:02code in hopes that one of them will
- 00:17:04match a weakness on your computer so how
- 00:17:07does this exactly work
- 00:17:08well first you visit the site and during
- 00:17:11the 3-way handshake connection of the
- 00:17:13tcp/ip protocol a Bacchan script is
- 00:17:16triggered as soon as a connection is
- 00:17:18made vile the last ACK packet is sent a
- 00:17:20download is also triggered and the
- 00:17:23malware is basically injected into your
- 00:17:25system now the best advice I can share
- 00:17:27about avoiding drive-by downloads is to
- 00:17:29avoid visiting websites that could be
- 00:17:31considered dangerous or malicious this
- 00:17:33includes adult content file sharing
- 00:17:35websites or anything that offers you a
- 00:17:38free trip to the Bahamas now some other
- 00:17:40tips to stay protected include keep your
- 00:17:43internet browser and operating system
- 00:17:44up-to-date
- 00:17:45use a safe search protocol that warns
- 00:17:47you when to navigate to a malicious site
- 00:17:49and use comprehensive security software
- 00:17:51on all your devices like McAfee
- 00:17:53all-access and keeping it up to date
- 00:17:56okay so that was it about drive-by
- 00:17:58downloads next up is my lad vert icing
- 00:18:01or malvert icing so malvert icing is the
- 00:18:04name we in the security industry give to
- 00:18:06criminally controlled advertisements
- 00:18:08which intentionally infect people and
- 00:18:10businesses these can be any ad on any
- 00:18:13site often ones which you use as a part
- 00:18:16of your everyday internet usage and it
- 00:18:18is a growing problem as is evident by a
- 00:18:20recent US Senate report and the
- 00:18:23establishment of bodies like trust in
- 00:18:25ads now whilst the technology being used
- 00:18:27in the background is very advanced the
- 00:18:30way it presents to the person being
- 00:18:31infected is simple to all intents and
- 00:18:34purposes the advertisement looks the
- 00:18:37same as any other but has been placed by
- 00:18:39criminal like you can see the mint ad
- 00:18:41out here it's really out of place so you
- 00:18:44could say it's been made by a criminal
- 00:18:45now without your knowledge a tiny piece
- 00:18:48of code hidden deep in the advertisement
- 00:18:50is making your computer go to the
- 00:18:52criminal servers these and catalog
- 00:18:55details about your computer and its
- 00:18:56location before choosing which piece of
- 00:18:58malware to send you and this doesn't
- 00:19:00need a new browser window and you won't
- 00:19:02know about it so basically you're
- 00:19:04redirected to some criminal server the
- 00:19:07malware injection takes place and voila
- 00:19:09you're infected it's a pretty dangerous
- 00:19:11thing to be in so how exactly can you
- 00:19:14stop magnetising well first of all you
- 00:19:17need to use an ad blocker which is a
- 00:19:19very must in this day and age you can
- 00:19:22have ad blocker extensions installed on
- 00:19:25your browser whether it be Chrome Safari
- 00:19:26or Mozilla also regular software updates
- 00:19:29of your browser and other software's
- 00:19:31that work peripheral to your browser
- 00:19:32always help and next is some common
- 00:19:36sense any advertisement that is about
- 00:19:38lottery that's offering you free money
- 00:19:40is probably going to scam you and inject
- 00:19:42malware too so never click on those ads
- 00:19:45so the last kind of cyberattacks we are
- 00:19:48going to discover today and discuss
- 00:19:50about is rogue software so rogue
- 00:19:52security software is a form of malicious
- 00:19:54software and Internet fraud that
- 00:19:56misleads users into believing that there
- 00:19:59is a virus on their computer and
- 00:20:00manipulates them into paying money for a
- 00:20:03fake malware removal tool it is a form
- 00:20:06of scare that manipulates users through
- 00:20:08fear and a form of ransomware rogue
- 00:20:10security software has been a serious
- 00:20:12security threat in desktop computing
- 00:20:14since 2008 so now how does a rogue
- 00:20:16security software book these scams
- 00:20:19manipulating users into download the
- 00:20:21program through a variety of techniques
- 00:20:22some of these methods include ads
- 00:20:24offering free or trial versions of
- 00:20:26security programs often pricey upgrades
- 00:20:28are encouraging the purchase of the
- 00:20:30deluxe versions then also pop-ups
- 00:20:33warning that your computer is infected
- 00:20:34with the virus which encourages you to
- 00:20:36clean it by clicking on the program and
- 00:20:38then manipulated SEO rankings that put
- 00:20:41infected website as the top hits when
- 00:20:43you search these links then read
- 00:20:45directly to a landing page that claims
- 00:20:47your machine is infected and encourages
- 00:20:49you a free trial of the rogue security
- 00:20:51program
- 00:20:51now once the scareware is installed it
- 00:20:54can steal all your information slow your
- 00:20:56computer or corrupt your files disable
- 00:20:59updates for Less limit antivirus
- 00:21:00software or even prevent you from
- 00:21:02visiting less timet security software
- 00:21:04vendor sites while talking about
- 00:21:06prevention the best defense is a good
- 00:21:08offense and in this case an updated
- 00:21:11firewall makes sure that you have a
- 00:21:12working one in your office that protects
- 00:21:15you and your employees from these type
- 00:21:16of attacks it is also a good idea to
- 00:21:19install a trusted antivirus or anti
- 00:21:21spyware software program that can detect
- 00:21:23threats like these and also a general
- 00:21:26level of distrust on the internet and
- 00:21:28not actually believing anything right
- 00:21:30off the bat is the way to go ok guys so
- 00:21:32that was me about all the a different
- 00:21:34types of cyber threats and how they
- 00:21:36actually work and how you could prevent
- 00:21:38them I also hope you enjoyed the
- 00:21:40demonstration I showed about phishing
- 00:21:42that's it for me goodbye
- 00:21:44I hope you have enjoyed listening to
- 00:21:46this video please be kind enough to like
- 00:21:49it and you can comment any of your
- 00:21:51doubts and queries and we will reply
- 00:21:53them at the earliest do look out for
- 00:21:56more videos in our playlist and
- 00:21:57subscribe to any rekha channel to learn
- 00:22:00more happy learning
- cybersecurity
- malware
- phishing
- DDoS
- password attacks
- internet safety
- drive-by downloads
- malvertising
- rogue software