//php print_r(get_the_ID()); ?>
							 13 Apr 2024
							13 Apr 2024
						
Recently, Apple issued alerts to iPhone users in 92 countries including India,cautioning them from mercenary spyware attacks including Pegasus.
| National cyber security agency, Computer Emergency Response Team (CERT-In) has issued a warning against Malware Attack in India‘Akira’:
 ‘Daam’:
 Raccoon Stealer Malware:
 Hermit Spyware:
 | 
|---|
Companies producing mercenary spyware include the NSO Group, FinFisher, and Hacking Team.
| Communication Surveillance in India: 
 | 
|---|
| Types of Malware | 
| Ransomware: In a ransomware attack, an adversary encrypts a victim’s data and offers to provide a decryption key in exchange for a payment. | 
| Fileless Malware: Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. | 
| Spyware: Spyware is a type of unwanted, malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent. | 
| Adware: Adware is a type of spyware that watches a user’s online activity in order to determine which ads to show them. | 
| Trojan: A trojan is malware that appears to be legitimate software disguised as native operating system programs or harmless files like free downloads. | 
| Worms: A worm is a self-contained program that replicates itself and spreads its copies to other computers. | 
| Rootkits: Rootkit malware is a collection of software designed to give malicious actors control of a computer network or application. | 
| Bootkits take this a step further by infecting the master boot prior to the operating system being on boot up, going undetectable at times. | 
| Mobile Malware: Mobile malware is any type of malware designed to target mobile devices. Mobile malware is delivered through malicious downloads, operating system vulnerabilities, phishing, smishing, and the use of unsecured WiFi. | 
| Exploits: An exploit is a piece of software or data that opportunistically uses a defect in an operating system or an app to provide access to unauthorized actors | 
| Scareware: Scareware tricks users into believing their computer is infected with a virus. | 
| Keylogger: Keyloggers are tools that record what a person types on a device. In a keylogger attack, the keylogger software records every keystroke on the victim’s device and sends it to the attacker. | 
| Botnet: Botnet is a network of computers infected with malware that are controlled by a bot herder. The bot herder is the person who operates the botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, inject malware, harvest credentials or execute CPU-intensive tasks. | 
| MALSPAM: Malicious malware (MALSPAM) delivers malware as the malicious payload via emails containing malicious content, such as virus or malware infected attachments. | 
| Must Read | |
| NCERT Notes For UPSC | UPSC Daily Current Affairs | 
| UPSC Blogs | UPSC Daily Editorials | 
| Daily Current Affairs Quiz | Daily Main Answer Writing | 
| UPSC Mains Previous Year Papers | UPSC Test Series 2024 | 
<div class="new-fform">
</div>