IS USING INTERNET SAFE?

Image
Many people surf the Internet as part of their work activities, others visit a wide range of pages to stay fully informed of the news in the world, perhaps simply to complement their educational training or to entertain themselves during leisure hours. But everyone wonders if it is really possible to surf safely on the internet and that is precisely what this article is about. What Is Internet Security? Within the operating rules and policies that are part of the management of the websites to which users have access, a series of parameters have been established in order to prevent and control unauthorized entry to the resources available within Internet. This is part of internet security and its goal is to maintain a level that allows users to enter each page without risks to their computer or the integrity of their personal information. Therefore, talking about security is having ways to prevent, protect and avoid unauthorized intrusion to private networks, such as corporate or ev...

BACKDOOR VIRUS: WORKING AND ITS EXPANSION

How Does A Backdoor Work?

It works in the background and is not visible in software in use. It is very similar to other viruses and malware, and therefore difficult to detect. A hacker can use the backdoor to spy on a user, manage their files, install additional software or malware, monitor the entire PC system, and attack other hosts. Often the backdoor also has other malicious functions, such as keystroke recording, screenshot capture, miscellaneous infections, and file encryption. This parasite is the result of a combination of various private security threats that are interrelated and do not require special remote control.

Backdoor attack
Most backdoors are malicious software that must somehow be installed on a computer. However, some backdoors do not need to be installed because some parts are already built into software that works with the remote host. Sometimes programmers leave these backdoors in their total security software for diagnostic and troubleshooting purposes. But hackers use them to break into a system.

Typically backdoors are Trojans, viruses, keyloggers, spyware, and specific remote management tools. They work the same as the virus apps mentioned above. However, their functionality and viral load are much more complex and dangerous, and therefore they fall into a specific category.

The most common backdoor programs mainly infect computers running the Microsoft Windows operating system. However, many little-known backdoors are designed to work in different environments, such as Mac OS X.

How Are Back Doors Spreading?

Physical access to the computer

The easiest way is to physically access the machine (yourself, an employee, someone who can access your premises, a private investigator, a relative etc. The person who had access to the computer can also be a normal user who has been manipulated and unintentionally installs the parasite, causing him to do something completely different with the installation of this software, through an usb stick or the like. This should be considered a security breach (the first and the biggest security breach often turns out to be a human).

 

Social engineering

A convincing text or a deceptive demonstration convinced you to install a simple toolbar that you think you need. Many unauthorized security services, many of which carry parasites (behaving like Trojans), use this social engineering technique. Here again, the problem is human.

With the help of a Trojan horse

The most common way to install a parasite is to use a Trojan horse or Trojan. For example, you install software X on your computer: it does not install itself. But X is a vector for many parasites, including a virus that allows you to install other parasites in your system. It is a Trojan horse. This need to install the Trojan to install the parasites it contains is important because it indicates that it is installed in an authorized way. As a result, security measures and procedures are deficient and ineffective, or the attacker has an accomplice.

Opening a trapped email

Spam or not, you should never open an email whose sender you do not know and you should never click on the link it contains (if it contains one). Such an e-mail can be likened to a Trojan horse, which the e-mail service providers have not detected as malicious.

Hoax usage

They are generally found in P2P networks, where the parasites are named for highly sought-after programs (recently released games, the most downloaded films, etc.) but also in e-mails (spam or not), in particular to propagate a fake news with one or more links inside! The phishing also works like this.

The use of a security vulnerability

In rare cases, the parasite gets installed automatically from the Internet, using software vulnerabilities. For example, one method is to attack a well-protected system, using a sniffer (network analyzer) on the connection between that computer and a less secure remote computer than the former regularly uses (for example, daily transfers from a branch to mother Society). The sniffer can be used to find out the identity and type of files sent regularly between one and the other. It is therefore sufficient to transfer a parasite through one of these files to a less monitored machine to infect the target machine.

Use of phishing

Today, phishing is no longer simply copying a well-known site to retrieve your banking information. Indeed, on certain illegal sites such as streaming or download sites, a request for access to the location or to flash for example can be made and perfectly imitate that of Google Chrome. If you click on it, a software installs in the background and you are infected ... Finally, one of the oldest methods of phishing but which still works is the use of trapped images like the famous images invisible (especially on older browser versions).

Comments

Popular posts from this blog

HOW TO STAY UP TO DATE ABOUT KEEPING DATA SAFE?

COMPANIES INTERNET SECURITY

IS USING INTERNET SAFE?