//php print_r(get_the_ID()); ?>
Recently, Apple issued alerts to iPhone users in 92 countries including India,cautioning them from mercenary spyware attacks including Pegasus.
National cyber security agency, Computer Emergency Response Team (CERT-In) has issued a warning against Malware Attack in India‘Akira’:
‘Daam’:Â
Raccoon Stealer Malware:Â
Hermit Spyware:Â
|
---|
Â
Companies producing mercenary spyware include the NSO Group, FinFisher, and Hacking Team.Â
Communication Surveillance in India:
|
---|
Types of Malware |
Ransomware: In a ransomware attack, an adversary encrypts a victim’s data and offers to provide a decryption key in exchange for a payment. |
Fileless Malware: Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. |
Spyware: Spyware is a type of unwanted, malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent. |
Adware: Adware is a type of spyware that watches a user’s online activity in order to determine which ads to show them. |
Trojan: A trojan is malware that appears to be legitimate software disguised as native operating system programs or harmless files like free downloads. |
Worms: A worm is a self-contained program that replicates itself and spreads its copies to other computers. |
Rootkits: Rootkit malware is a collection of software designed to give malicious actors control of a computer network or application. |
Bootkits take this a step further by infecting the master boot prior to the operating system being on boot up, going undetectable at times. |
Mobile Malware: Mobile malware is any type of malware designed to target mobile devices. Mobile malware is delivered through malicious downloads, operating system vulnerabilities, phishing, smishing, and the use of unsecured WiFi. |
Exploits: An exploit is a piece of software or data that opportunistically uses a defect in an operating system or an app to provide access to unauthorized actors |
Scareware: Scareware tricks users into believing their computer is infected with a virus. |
Keylogger: Keyloggers are tools that record what a person types on a device. In a keylogger attack, the keylogger software records every keystroke on the victim’s device and sends it to the attacker. |
Botnet: Botnet is a network of computers infected with malware that are controlled by a bot herder. The bot herder is the person who operates the botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, inject malware, harvest credentials or execute CPU-intensive tasks. |
MALSPAM: Malicious malware (MALSPAM) delivers malware as the malicious payload via emails containing malicious content, such as virus or malware infected attachments. |
Â
Â
Must Read | |
NCERT Notes For UPSC | UPSC Daily Current Affairs |
UPSC Blogs | UPSC Daily Editorials |
Daily Current Affairs Quiz | Daily Main Answer Writing |
UPSC Mains Previous Year Papers | UPSC Test Series 2024 |
Â
To get PDF version, Please click on "Print PDF" button.
How Climate Change is Creating Refugees Across the...
View India’s Gender Gap Report Ranking as a Warn...
Aiding India’s Progress with Choice, Control and...
Bridge too Far: On the Bridge Collapse in Vadodara
How India’s Biofuel Potential Complements its Le...
As PM Modi lands in Namibia, this is why the Count...
<div class="new-fform">
</div>