Home > Uncategorized > Ways in which hackers get into your computer

Ways in which hackers get into your computer

Malware, are malicious software, created and used by hackers to gather sensitive information, gain access to your computer, disrupt and damage computer and devices attached to the computer. It can also appear in the form of scripts or code. ‘Malware’ is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.
Malware includes computer viruses, worms, trojan horses, spyware, adware, most rootkits, and other malicious programs. Malware are harmful because these are meant to deal with your computer and information stored in it in a hidden manner.
The use of malware is increasing, and so is the complexity and its purpose of the malware. Recent revelations about the Flame virus is a proof to this. The volume of malicious software detected in 2011 was up 41 per cent over the previous year, said Dean Turner, director of Symantec Intelligence Group.
The popular methods used to infect your computer were-
1. tempting you to click on a malicious website or, email attachment
2. via USB sticks
Though the methods are still almost same, these days the devices are many and hackers are developing new ways get upto you to access your information.
1. Breaking into your smartphone: Malicious apps, which when loaded takes control of your phone. In December 2011, Google removed 22 apps from the Android market on the grounds they were scamming users into paying premium SMS charges for texts.
2. Via social media like Facebook and Twitter to target who they will send their malware to next. In 2010, hackers found a loophole in Adobe’s software and sent a number of golf-playing executives a malware-ridden pdf file claiming to contain tips from noted golf instructor David Leadbetter.
3. Hold your computer ransom: “Ransomware” has emerged as a popular scam for small-time hackers. It typically involves holding a computer hostage with the threat to erase the data unless a payment is made. In Canada, this malware was employed to freeze computers and send a pop-up message, purportedly from the Canadian Security and Intelligence Service claiming that the address had been linked to downloading child pornography and would remain frozen unless the user made a $100 payment through an online payment site.
4. DNSChanger like malware which direct you to other IP addresses.
5. Espionage operations where the virus picks information from your computer and sends it to the creator of the virus like the GhostNet, or damages computer or attached devices like the StuxNet.
6. Hacktivism: Some hackers are attaching with a political or activist agenda, like the Anonymous group which advocates for no censorship of content on  Internet.
(Source: CBC News, Wikipedia)
Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s