FR EN

Cybersecurity Threats

Cybersecurity Threats

To better understand how to protect yourself online, one of the first steps is to learn about the different bad actors that will try to trap you and the common strategies they can use to trick their victims.

Botnets

From a combination of the words robot and network, a botnet is a collection of internet-connected programs that creates an army of ‘zombies’ (infected computers) in order to perform tasks such as sending spam email, spreading malware or participating in denial-of-service attacks against a web server.

Read more

Computer worms

Much like viruses, worms spread from one computer to another through a network or the Internet.

Read more

Hacking

Malicious hacking is using technical means to access or interrupt your computer or communications.

Read more

Phishing

Phishing is common cybersecurity threat in which bad guys try to acquire your personal information by sending fake emails, text messages, or chat messages or by impersonating a website.

Read more

Pharming

Pharming, like Phishing, illegitimately gathers your personal (e.g., banking) information.

Read more

Ransomware

Ransomware is malware that will prevent you from accessing your computer by blocking access to your system or encrypting your files.

Read more

Trojan Horse Programs and Remote Access Trojans (RATs)

Named after the ancient Greek wooden Trojan horse, Trojans are malicious programs hidden within, or disguised as, legitimate software or files.

Read more

Scareware

Scareware is really similar to ransomware and will also try to extort you for money.

Read more

Spyware and adware

Spyware is software that is used to infiltrate your computer, gathering information and sending it to third parties without your consent.

Read more

Viruses

Probably one of the best known cybersecurity threats, computer viruses are malicious programs or code that can be on your computer without your knowledge.

Read more

Wi-Fi eavesdropping

This method is used to ‘listen’, monitor, or record information shared over an unencrypted Wi-Fi network.

Read more