Your computer could be extremely vulnerable to attacks if the person on another side of the network could find open loopholes in your system. You may suffer huge data loss and extreme damage to your system.
Your personal data could even be lost. Here, we are not talking just about the Firewall. A firewall can help in many situations. Even it does help in fact, but there are a lot of ports/channels that can make your computer vulnerable to malware.
For instance, you leave traces while tweeting on Twitter or chatting and posting on Facebook, etc. These are the examples that represent the specific type of channels that attacker can find to get in your computer. Here are some facts that show the statistics data of malware:
- Simple internet browsers face for almost half of the attacks (~45%), and it is done by tracing the packets user send by visiting or using specific website.
- Android malware had extreme growth in past year. Malicious apps in Google Play Store has risen by 38%.
- Outdated softwares are most vulnerable to attacks. Java and Flash Player are common in this category.
Network Channels Used by Malware to Spread on Internet
1. Drive-by Download
Most obviously, anyone could put anything in a file and name it whatever they want. It may look legit to you, and you don’t know what it actually contains before you download and open it.
As reports from Palo Alto, a huge majority of malware enters into victim system by drive-by download. Thes best way to stay safe is to scan your computer and file first before you open it.
There are many software services for that, you can check everything about it here.
Every USB drive has a file named Autorun. As soon as you put it on PC, this file contains the way they work.
However, autorun file could be modified and changed. There were some many popular attacks in past, used to spy, watch their activity and breaching their personal data.
Be sure while using USB in shared PCs in cafe and coffee shops, their system could be already infected and your USB could also get infected by them. Take USB by only those people you trust and scan it with an updated antivirus program.
3. Email and Messaging
The biggest and smallest malware attacks in past are commonly spread through emails. A majority of emails sent today contains some kind of malware.
Mos of mail services like Gmail, Yahoo, and Outlook uses a certain level of security, so you have filters for spam.
Be careful with what you open, and from whom it’s from.
4. Unpatched Software
Softwares are being developed all the time, and just because you are too lazy sometimes to install the newest update you may expose your computer to various different kinds of threats.
A zero-day exploit is popular on the topic of cybersecurity, and it is known for a long period of time. The hardest thing is that you cannot effectively avoid it; it is the software developers mistake and not yours.
To stay safe on the internet, do regular anti-virus checks on your computer. This should be your first and foremost step to stay safe on the internet.
- Chinese App Allow Anyone to Create Android Ransomware
- Wikileaks Vault 8 Released CIA’s Spying Tool’s Source Code
- AngelFire CIA Malware Infects System Boot Sector to Hack Windows PC