Software that displays advertising content on your computer. Like its cousin spyware, some adware runs with your full knowledge and consent and, some doesn't. More often an annoyance than a security risk, adware may also monitor browsing activities and relay that information to someone else over the Internet.
Bot or Web Bot
Derived from "robot." An automated program, such as a web crawler, that performs or simulates human actions on the Internet. Web bots are used for legitimate purposes by search engines, instant message (IM) programs and other Internet services, but can also be used to take control of computers, launch attacks and compromise data. They may act as part of a blended threat.
Botnet or Zombie Armies
A group of computers that have been compromised and brought under the control of an individual. The individual uses malware installed on the compromised computers to launch denial-of-service attacks, send spam or perpetrate other malicious acts.
An attack on a computer or network in which bandwidth is flooded or resources are overloaded to the point where the computer or network's services are unavailable to clients. This can also be carried out by malicious code that simply shuts down resources.
Thieves rummage through trash looking for bills or other paper that includes your personal information.
Software that monitors and captures everything a user types into a computer keyboard. Keyloggers are used for technical support and surveillance purposes, and can also be integrated into malware and used to gather passwords, usernames and other private information.
Also known as ‘malicious software’, malware is designed to harm, attack or take unauthorized control over a computer system. Malware includes viruses, worms, Trojan horses, some keyloggers, spyware, adware and bots. It’s important to know that Malware can include a combination of the types noted.
Pharming takes place when you type in a valid web address and you are illegally redirected to a website that is illegitimate. These ‘fake’ websites ask for personal information, such as credit card numbers, bank account information, Social Security numbers and other sensitive information.
A scam that involves the use of replicas of existing web pages to try to deceive you into entering personal, financial or password data. Often suspects use urgency or scare tactics, such as threats to close accounts. This is one of the most common forms of fraud. If you need to report a phishing scam, please read the five steps to reporting fraud on the Report Fraud page.
Important Note: Landmark will never contact a member on an unsolicited basis and request your banking credentials.
A form of web advertising that appears as a “pop-up” on a computer screen, pop-ups are intended to increase web traffic or capture email addresses. However, pop-up ads are sometimes designed with malicious intent, for example when they appear as a request for personal information from a financial institution.
This virus specifically targets your computer defenses. It will look for vulnerabilities within your computer operating system or any third party security software. Most security vendors have some form of tamper-proof measure in place, so it is important to keep your patches up-to-date. Retro Viruses are usually combined with another form of attack.
A method of deceiving users into divulging private information, social engineering takes advantage of our natural tendency to trust one another rather than rely solely on technological means to steal information. Social engineering is often associated with phishing, pharming, spam and other Internet-based scams.
Unsolicited emails, usually sent in bulk to a large number of random accounts. Spam often contains ads for products or services and is used in phishing scams and other online fraud. Spam can be minimized using email filtering software.
Spim or Instant Spam
Unsolicited instant messages, usually sent in bulk to a large number of IM accounts which often contain marketing materials and links to product web pages. Spim may also be used in phishing scams or to spread malware. See also, spam.
Spoofing is when an attacker masquerades as someone else by providing false data. Phishing has become the most common form of web page spoofing. Another form, URL spoofing, happens when an attacker exploits bugs in your web browser in order to display incorrect URLs in your browser location bar. There's also a form of spoofing called “man-in-the-middle”. This occurs when an attacker compromises the communication between you and another party on the Internet. Many firewalls can be updated or configured to significantly prevent this type of attack.
Loaded onto your computer unbeknownst to you, spyware is a type of program that watches what users do and forwards information to someone else. It is most often installed when you download free software on the Internet. Unfortunately, hackers discovered this to be an effective means of sending sensitive information over the Internet. Moreover, they discovered that many free applications that use spyware for marketing purposes could be found on your machine, and attackers often use this existing spyware for their malicious means.
A Trojan is malicious code that is disguised or hidden within another program that appears to be safe (as in the myth of the Trojan horse). When the program is executed, the Trojan allows attackers to gain unauthorized access to the computer in order to steal information and cause harm. Trojans commonly spread through email attachments and Internet downloads. A common Trojan component is a “keystroke logger,” which captures a user’s keystrokes in an attempt to capture the user’s credentials. It will then send those credentials to the attacker.
A computer virus is a malicious program that attaches itself to and infects other software applications and files without the user’s knowledge, disrupting computer operations. Viruses can carry what is known as a “payload,” executable scripts designed to damage, delete or steal information from a computer.
A virus is a self-replicating program, meaning it copies itself. Typically, a virus only infects a computer and begins replicating when the user executes the program or opens an “infected” file.
Viruses spread from computer to computer only when users unknowingly share “infected” files. For example, viruses are commonly spread when users send emails with infected documents attached.
Vishing is a type of phishing attack where the attacker uses a local phone number in the fake email as a means of obtaining your sensitive information. The goal is to fool you into believing the email is legitimate by instructing you that responding to the request by phone is safer than responding by email and shows authenticity. The unsuspecting caller is then tricked through an automated phone system to relinquish their sensitive information.
A worm is similar to a virus but with an added, dangerous element. Like a virus, a worm can make copies of itself; however, a worm does not need to attach itself to other programs and it does not require a person to send it along to other computers.
Worms are powerful malware programs because they cannot only copy themselves; they can also execute and spread themselves rapidly across a network without any help.