//php print_r(get_the_ID()); ?>
13 Apr 2024
English
हिन्दी
Recently, Apple issued alerts to iPhone users in 92 countries including India,cautioning them from mercenary spyware attacks including Pegasus.
National cyber security agency, Computer Emergency Response Team (CERT-In) has issued a warning against Malware Attack in India‘Akira’:
‘Daam’:
Raccoon Stealer Malware:
Hermit Spyware:
|
|---|
Companies producing mercenary spyware include the NSO Group, FinFisher, and Hacking Team.
Communication Surveillance in India:
|
|---|
Types of Malware |
| Ransomware: In a ransomware attack, an adversary encrypts a victim’s data and offers to provide a decryption key in exchange for a payment. |
| Fileless Malware: Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. |
| Spyware: Spyware is a type of unwanted, malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent. |
| Adware: Adware is a type of spyware that watches a user’s online activity in order to determine which ads to show them. |
| Trojan: A trojan is malware that appears to be legitimate software disguised as native operating system programs or harmless files like free downloads. |
| Worms: A worm is a self-contained program that replicates itself and spreads its copies to other computers. |
| Rootkits: Rootkit malware is a collection of software designed to give malicious actors control of a computer network or application. |
| Bootkits take this a step further by infecting the master boot prior to the operating system being on boot up, going undetectable at times. |
| Mobile Malware: Mobile malware is any type of malware designed to target mobile devices. Mobile malware is delivered through malicious downloads, operating system vulnerabilities, phishing, smishing, and the use of unsecured WiFi. |
| Exploits: An exploit is a piece of software or data that opportunistically uses a defect in an operating system or an app to provide access to unauthorized actors |
| Scareware: Scareware tricks users into believing their computer is infected with a virus. |
| Keylogger: Keyloggers are tools that record what a person types on a device. In a keylogger attack, the keylogger software records every keystroke on the victim’s device and sends it to the attacker. |
| Botnet: Botnet is a network of computers infected with malware that are controlled by a bot herder. The bot herder is the person who operates the botnet infrastructure and uses the compromised computers to launch attacks designed to crash a target’s network, inject malware, harvest credentials or execute CPU-intensive tasks. |
| MALSPAM: Malicious malware (MALSPAM) delivers malware as the malicious payload via emails containing malicious content, such as virus or malware infected attachments. |
| Must Read | |
| NCERT Notes For UPSC | UPSC Daily Current Affairs |
| UPSC Blogs | UPSC Daily Editorials |
| Daily Current Affairs Quiz | Daily Main Answer Writing |
| UPSC Mains Previous Year Papers | UPSC Test Series 2024 |
<div class="new-fform">
</div>