What is Ransomware and How Did I Get it ?
Ransomware can appear on your computer via phishing or spam emails containing attachments. These attachments or links in the content are the ransomware hooks.
Ransomware can appear on your computer via phishing or spam emails containing attachments. These attachments or links in the content are the ransomware hooks.
Many folks think that phishing and spear-phishing are the same thing, but they are mistaken. One is a specific kind of cyberattack, the other a little more generic.
Even if a site had a link on it that said, Don’t Click That ! I am sure there are a bunch of folks who would still click on it, just out of curiosity. Curiosity killed the cat (after all). At least run the link through a “link check” site! Cyber criminals are always coming up with new ways to use phishing scams to steal your personal information.
Phishing for your personal information so that they can steal your identity happens even at the University Graduate level, here is a phishing example.
Near Field Communication (NFC), is a technology that enables ‘tap to pay’ transactions with mobile phones. The author expresses concerns about NFC’s security, although the technology is said to be only for short-range use. Possible security risks include eavesdropping, data corruption, interception attacks, and device theft. Despite these concerns, the author acknowledges NFC’s practicality and widespread use in point-of-sale terminals. An example of NFC in use is Apple Pay. Yet, the author advises users to be cautious while using NFC-based payment systems, possibly employing methods such as NFC-safe wallets for added security.
In most networks the edge of the network, or the customer facing part of the network is where security must be most vigilant, as this is typically where most attacks or attempts to maliciously enter the system starts (yes, there are always issues with insider attacks, as well).