Dangers on the Internet (Part II)

0 17
Avatar for Lira
Written by
3 years ago

In like manner, we also have Pharming, just like phishing the main goal of this is to gain some confidential information’s to steal money from any accounts electronically. Pharming is a dangerous hacker attack that redirects the users from the authentic websites to the fake one. Using malicious sites, the pharmer have a chance to get your personal information’s if you enter it to that malicious website.

Let’s just be clear, it is important to realize the difference between Phishing and Pharming. Phishing starts with an email that asks the user to visit a website while the pharming starts in redirecting the users to a fictitious site. To prevent these two kinds of dangers it is very important to be sure about the websites that we used. Always check for the spelling and grammar errors of websites and you can also check the URL, aside from this there are many ways to find out if a website is the real one.

Then the Spyware, it’s all about secretly destroying your privacy because it can monitor your internet habits without your permission. It can watch your actions on how you used the internet, affect the performance of your computer and control or handle the activities on your computer. This unwanted software is a widespread threat in our Internet that installed covertly on a personal device/ computer. You cannot easily recognize that you have spyware in your computer because it runs quietly in the background to collect information. But there are ways to find out if your computer has spyware when your device is running slow and if you observe something different to your apps and files that you have. To prevent installing spyware, we need to have “Anti- Virus Apps” for our own security it will help us to detect and remove different kinds of computer viruses in our device.

In addition, we have a Computer worm this is a kind of malware that replicates and spread itself from one computer to another computer. It can cause many damages to a computer, it can delete files and can destroy network functions. For this reason, it is very important to be careful about this because it is very hard to have a worm in a computer. Computer worms can be got from different attachments from malicious sources, it is easy to spread out or to infect your computer that’s why just like in email spam and phishing, it is the best thing that when we receive different emails from unknown source don’t open it.

1
$ 0.00
Avatar for Lira
Written by
3 years ago

Comments