Ransomware, scams, & cybersecurity
Ransomware and scams are types of cyber threats and in order to prevent such threats, cybersecurity is incorporated. This article highlights basic concepts of cybersecurity, scams and ransomware.
Ransomware is a type of malware which is used to disable the functionality of the computer by the encrypting the files. After computer infection, a “ransom note” is displayed on the screen that demands a certain amount which is usually in the form of bitcoin. Ransomware attackers use bitcoin as a medium of payment in order to avoid traceability. In some cases, these cybercriminals add pressure on the user by adding the date and time and if the user fails to meet the deadline then the attacker will destroy the decryption key.
Ransomware can enter into your computer by using several techniques such as website pop-up advertisements and malicious attachments. There are two most common types of Ransomware:
Encryption ransomware: This type of ransomware attack will encrypt files of your system hardware, USB drives, cloud storage drives and external hard drives. In addition, it will prevent the user from opening the files.
Lockscreen ransomware: It shows an image which is used to prevent the user to access the computer system.
How to prevent ransomware:
- Never pay the ransom because there is no guarantee that after paying the amount, the user will be able to access the data or not.
- In case of computer infection, contact a technician in order to know whether data can be retrieved.
- Make sure to have a good and updated backup plan of data so, in case of computer infection, the user can still access data files.
Scams are considered as a fraudulent scheme which is performed by the individual, group or corporation in order to get money from users by using false means. In today’s world of advanced technology, new forms of scams are in the market including scam baiting, phishing, lottery scams and email spoofing. Below is the list of some common scams:
It is mainly dependent on the communication made via social networks or email. The attacker used to send emails to different users and asks them to provide their personal and professional information and pretends as if this email has been sent by the authentic source. Same as other cyber threats, the effectiveness of phishing is directly proportional to the users. Providing maximum information will give rise to worst outcomes in terms of data loss.
Social Media Scams:
In maximum cases, scammers target social media platforms including LinkedIn, Facebook and Twitter in order to get personal information of the user. Later this information is misused by the scammers to get heavy amounts from the user in return.
Cybersecurity is used to protect the internet connected systems which include software, hardware, and data from the cyber threats. These threats are used to interrupt business process or to destroy and change the user sensitive information to get money from the users. Following are some common types of cybersecurity:
- Critical Infrastructure
- Network security
- Cloud security
- Application security
- Internet of Things security