//php print_r(get_the_ID()); ?>
Recently, Apple issued alerts to iPhone users in 92 countries including India,cautioning them from mercenary spyware attacks including Pegasus.
National cyber security agency, Computer Emergency Response Team (CERT-In) has issued a warning against Malware Attack in India‘Akira’:
‘Daam’:
Raccoon Stealer Malware:
Hermit Spyware:
|
---|
Companies producing mercenary spyware include the NSO Group, FinFisher, and Hacking Team.
Communication Surveillance in India:
|
---|
Types of Malware |
Ransomware: In a ransomware attack, an adversary encrypts a victim’s data and offers to provide a decryption key in exchange for a payment. |
Fileless Malware: Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. |
Spyware: Spyware is a type of unwanted, malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent. |
Adware: Adware is a type of spyware that watches a user’s online activity in order to determine which ads to show them. |
Trojan: A trojan is malware that appears to be legitimate software disguised as native operating system programs or harmless files like free downloads. |
Worms: A worm is a self-contained program that replicates itself and spreads its copies to other computers. |
Rootkits: Rootkit malware is a collection of software designed to give malicious actors control of a computer network or application. |
Bootkits take this a step further by infecting the master boot prior to the operating system being on boot up, going undetectable at times. |
Mobile Malware: Mobile malware is any type of malware designed to target mobile devices. Mobile malware is delivered through malicious downloads, operating system vulnerabilities, phishing, smishing, and the use of unsecured WiFi. |
Exploits: An exploit is a piece of software or data that opportunistically uses a defect in an operating system or an app to provide access to unauthorized actors |
Scareware: Scareware tricks users into believing their computer is infected with a virus. |
Keylogger: Keyloggers are tools that record what a person types on a device. In a keylogger attack, the keylogger software records every keystroke on the victim’s device and sends it to the attacker. |
Botnet: Botnet is a network of computers infected with malware that are controlled by a bot herder. The bot herder is the person who operates the botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, inject malware, harvest credentials or execute CPU-intensive tasks. |
MALSPAM: Malicious malware (MALSPAM) delivers malware as the malicious payload via emails containing malicious content, such as virus or malware infected attachments. |
Must Read | |
NCERT Notes For UPSC | UPSC Daily Current Affairs |
UPSC Blogs | UPSC Daily Editorials |
Daily Current Affairs Quiz | Daily Main Answer Writing |
UPSC Mains Previous Year Papers | UPSC Test Series 2024 |
To get PDF version, Please click on "Print PDF" button.
<div class="new-fform">
</div>