top of page

TYPES

phishingsigns.jpg

Phishing

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Worms

Worms can be transmitted in a variety of ways, most of which are similar to how any form of cyber security threat is. Once installed, they can delete or modify files, or even add malicious software onto a computer. They can also steal data or give access to hackers. In short, you don't want them.

Other than running a virus scan, which should always be a safety precaution as talked about on the Protection Against Threats page, there are a few other signals of a possible worm in a device. First, free space on your computer is being used excessively and for no attributable reason is a warning flag. Slower speed and performance of devices is another possible sign. Finally, new or missing files can be suspect to the presence of a worm.

worm.jpg

Trojan Horse

A Trojan Horse deceives devices into loading and carrying out malware. However, they can't self execute or replicate like other viruses, and need to be executed by the user. These programs can be present on mobile devices as well, in the form of fake applications.

security-trojan_horse_mobile.png
bottom of page