Alert Africa | Cyber Threats
5409
page-template-default,page,page-id-5409,ajax_updown_fade,page_not_loaded

Cyber Threats

Threats to you online

threats-online

Drive-by Downloads

These are typically launched by attackers on sites they have hacked and implanted malicious code on; these attacks take advantage of browser vulnerabilties and cause them to automatically download any malicious code / virus that they attacker specifies

Clickjacking:

Attackers typically compromise a site (or even your browser) to launch pop-ups- that may not be harmful themselves- however, upon clicking that pop-up you may infect your device. Infact, most pop-ups will lead to infection even if you click the “no” button on the pop-up

Phishing

This type of attack happens when attackers send you an email with a link. When you click on that link, you may be presented with aa banking site or Social Media site and asked to login; by doing that the attackers gain access to your Banking PIN or Social Media/online passwords

Malvertisement

This is malicious advertisement that attackers use to advertise on the internet, with the intent of infecting the viewer of that advertisement with malicious software (malware)

Ransomware

This is a type of attack where attackers take control of your device or information and then demand money in exchange. They normally encrypt your device or information so that only they can decrypt it if you give them money

 

Threats to your devices

threats-to-devices

Third-party apps

Attackers may develop third-party apps that users unwittingly download and use, while in the backgroud these apps steal sensitive information such as passwords, PINs or install more malicious software (malware) or users devices

Premium SMS billing

Through phishing or compromised third-party apps, attackers can make your phone send premium rate SMS’s without your knowledge, thus draining you of money while making money themselves

Spyware (spy software)

Attackers can install malware on your device via different means, and then have access to everything you do on your device, essentially spying on you and your activity

Wi-Fi

Hackers can easily set-up a fake Wi-Fi hotspot with the same name as the one you use and your mobile or you, could connect to it; everything would work normally, only in this case, the hacker will be able to monitor what you are doing online or even gain access to your login credentials

Ransomware

This is a type of attack where attackers take control of your device or information and then demand money in exchange. They normally encrypt your device or information so that only they can decrypt it if you give them money

Botnets

Attackers can often infect your device with malware and thus make your device part of their botnet (robot network) which they can then use to attack others or make money for them online. Your device will be under their control without you knowing