Federal Agency Outlines Common Cyber Threats and Risk

While cybersecurity threats are constantly evolving, many cyber criminals use variations of the same methods of cyber attack. Specifics of these attacks may differ, but the nature of the attacks stay the same. Cyber criminals take advantage of a user’s lack of technical expertise and trusting natures.

The Stop.Think.Connect. Campaign, with assistance from the United States Computer Emergency Readiness Team (US-CERT), encourages everyone to understand these common threats and risks, and to take steps to protect themselves.

Ransomware

Malware: Malware is a general term to describe malicious code or software. There are many types of malware, including viruses, worms, trojan horses, ransomware, and spyware to name a few. Malware can disrupt your computer’s operations and destroy files or run quietly in the background, tracking what you type or what sites you visit, and sending this information from your computer to cyber criminals. In the case of ransomware, the malicious code locks your computer or encrypts certain files on your computer and threatens to delete files or keep your computer locked until you pay a monetary fine.

What you can do to protect yourself:

If your system has already been infected:

Outdated Software and Operating Systems: Don’t be complacent about cybersecurity when you purchase a new computer or mobile device, or install new software. Even after their release, operating systems and other software may have or develop security vulnerabilities that cyber criminals can exploit. Software vendors will release patches or updates for their software when security vulnerabilities are discovered.

Computer and mobile device manufacturers will also release updated operating systems that provide increased security.

What you can do to protect yourself:

Phishing: Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques, or tricking them into thinking that the activity is legitimate or necessary. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or from someone the person actually knows. These emails often entice users to click on a link that takes the user to a fraudulent (or “spoofed”) website that appears to be legitimate. The user may be asked to provide personal information, such as account usernames and passwords.

Additionally, these fraudulent websites may contain malicious code. Attackers sometimes take advantage of major events – such as a natural disaster, sporting event, etc. – and pretend to be legitimate charities or retailers to entice users.

What you can do to protect yourself:

For more information on cyber threats and risks, and how to protect yourself, visit https://www.us-cert.gov/ncas/tips.

Source: US-CERT