AbstractMost people use the Internet without thinking about security and privacy, they don't bother about the kind of site they visit, where they download their Applications, movies and other files/ documents, they give every authorisation a software or website request for them without checking them and others. The truth is that the Internet is not as save as we thought it was, as time goes by it becomes worst and most people still don't see the dangers until they become victimised and then they will know indeed that their device is part of their that can hold a large part of their life's. So many security threats online but some of the most common and dangerous is the phishing scam and malware threat, phishing scam can be called as the most dangerous because most of the cybersecurity threat can come from it, through phishing scam malware can be sent to a device and this is among the reason we have to be cautious of the link we clicked online, especially from email, social media and other platforms like this forum.
MalwareMalware are code or program that are usually attached to a file or software that disrupts the proper working flow of such device. This is also called malicious software, hackers implant these in order to get access to the victim device and do as he/she feels and can be to steal the victim coins, money, important documents/files or even blackmailing or requesting for ransom from them and others.
some types of malware There are various types of malware, This include :
- Spyware :
This malware makes itself hidden for you on your device, It observe your activity on your device and can send this to the hacker. It can be use to steal your logging details like password and username of your bank, email and others. - Adware :
This malware can be a software or website spam your device with Ads, they mainly pop-up ads. - Keylogger :
This keep track of all the the keys you click on your keyboard, it collect them and send to the hacker, with this your logging details like username and password can be stolen. - Rootkit :
This gives the hacker administrator control access to your device. - Virus :
This is a type of malware and not the term malware itself though most people use it interchangbly but that is not correct. This malware is activated by you when execute the file, link or app it is program into and then start spreading just how normal virus on living things spread. The harm cause by this malware varies from negligible to literally crashing your device. - Worm :
This is similar to the malware virus but one key difference is that it do automatically activate itself and start spreading. - Trojan or Trojan horse :
This malware at first looks like a legit software but the actual truth is that its far from that, it open a back door for the hacker to gain access to your device and then do as he/she pleases like install other malware mostly Ransomware. Its among the most(if not the most) dangerous malware - Ransomware :
This malware give the hacker authority to either to completely lock you out of your device or lock you out of some directory of your device. This malware has become preferably by hackers since its easier for them to request ransom from the victims in order give them access to their device or file. - Cryptojacking/Malicious crypto mining :
This malware allow hackers to mine cryptocurrency using your own computer and the rewards go to the hacker. This is usually place on your computer through the Trojan malware.
There are also other malware and all these malware have various classes and examples, how destarous depends on what the hacker want to do. Just as there have been growth for the fight against Malware there have been also been growth on the immunity of malware to fight against them, some malware can fight or even make itself invincible to them.
Some signs to know malware affected device There are some signs to know if your device might be affected by malware, this include :
- When you notice sudden loss of your device storage
- When your device processor start slowing down and your device start over heating
- When you notice a sudden increase on your internet activity and also when your browser settings changes e.g you notice a new extensions, plug-ins or toolbars.
- When your lose access to your device, some files or documents.
- When your Anti-Malware assistance stop responding for no reason
Malwares mostly affect your device through the internet (though can also affect them through USB drive and file transfer offline), where and what we download matters and links we click on matters.
Some steps to protect your device from malware Some steps to consider to protect your device against malware include :
- Be cautious of where you download your files and application and also try to know the actual files and application you are about to download to avoid clone.
- Be cautious of the site you visit and also of the links you click especially when it was sent to you or posted by someone you don’t know
- Be cautious of the type of authorization you give to some applications because there is a possibility of your download to contain malware even if you where downloading from a trusted source
- Be cautious of the Anti-Malware assistance you use because some of them are while malware themselves while some may be doing little or nothing i.e just occupying space
- Avoid cracked closed source apps since you can not tell what was done on it
- Be cautious of any sudden change on your device and browser, don`t see it as it doesn`t matter since your device is like a part of you especially when your coins or financial documents are stored on that device because most times this small changes can turn to something disastrous.
- Update apps early especially those which you use for security and privacy protection and also delete apps that you are no longer using
- Have at least a basic knowledge of cybersecurity and also try to stay updated about the latest malware, phishing scam and other cyber threat and protection news.