It’s not just humans that get viruses, so do computers. COVID-19 is proving a breeding ground for malware and ransomware attacks.
We have seen a rise of malware and ransomware attacks in recent months, and we would like to keep you informed and offer advice on the best way to prevent such attacks.
Protect your digital progress, systems and data
ESET’s future-ready Internet Security protects your digital life every step of the way. Secures Windows, macOS and Android devices.
ESET Internet Security delivers rock-solid multi-layered antimalware protection for everyday web users, built on ESET’s trademark balance of detection, speed and usability. As well as award-winning ESET Antivirus and Antispyware, and ESET’s firewall, you can protect your webcam from misuse, check the security of your Wi-Fi router, test your network-connected smart devices and bank online more safely using ESET’s special secure browser window.
With the sudden increase in homeworking due to the Coronavirus pandemic hackers are looking for new, vulnerable targets. It is important that you stay safe when on the Internet. If your PC, laptop or tablet is turned on the chances are it is on the Internet.
So, what are the threats
The rise of the Trojan.
Trojans are the most common type of malware today. They are categorized according to their function: the most common include backdoors, password stealers, downloaders, and banking Trojans.
They are used to steal confidential information (username, password, PIN, etc.) for bank fraud.
They can also be used to spy on victims, install additional malware to suit the needs of the attackers and as part of DDoS (Distributed Denial of Service) attacks on organizations. Such attacks seek to extort money, using a ‘demonstration’ DDoS attack to give the victim a taste of what will happen if they don’t pay up.
Holding you to ransom.
In recent years, there has also been a steady growth in ‘ransomware’. This is the name given to malicious programs designed to extort money from their victims by either blocking access to the computer or encrypting the data stored on it. The malware displays a message offering to restore the system in return for a payment.
TIP: Regularly backup your data.
Phishing – masquerading as someone else.
Phishing involves tricking people into disclosing their personal details (username, password, PIN or any other access information) and then using these details to obtain money under false pretences.
Phishers create an almost 100% perfect replica of a chosen financial institution’s website. They then spam out an email that imitates a genuine piece of correspondence from the real financial institution.
Phishers typically use legitimate logos, good business style and even make reference to real names from the financial institution’s senior management. They also spoof the header of the email to make it look like it has come from the legitimate bank.
The fake emails distributed by phishers have one thing in common: they are the bait used to try and lure the customer into clicking on a link provided in the message. If the bait is taken, the link takes the user directly to an imitation site, which contains a form for the victim to complete. Here they unwittingly hand over all the information the cybercriminal needs to access their account and steal their money.
The human factor.
Humans are typically the weakest link in any security chain. There are several reasons for this, and many people are unaware of the tricks used by cybercriminals. Successive scams never look quite the same, which makes it difficult for individuals to know what to look out for.
UK ICT recommends ESET Internet Security – the most effective anti-virus software available. Please feel free to forward this e-mail to a colleague or friend . Keep up-to-date and be informed. Call UK ICT for more information relating to the Virus threat and how to protect yourself
In today’s digitally interconnected world, businesses must prioritise cybersecurity to safeguard their assets and maintain trust with clients and stakeholders. This case study delves into the story of how our client, a Human Resources Company that fell victim to a devastating breach of access control. The lack of multi-factor authentication (MFA) and weak internal controls […]