Destructive devices (Malware) which is a threat to steal data networking and release personal information of individual property information (proprietary information) to get money from the stolen data, namely through direct use or distribution of the dark. Content security threats that terlingkup content in terms of the umbrella (umbrella term) recorder includes typing, scrapers screen (screen scraper), spyware, advertising device, the back door and botnet. This term does not refer to activities such as sending junk messages, deception (phishing), DNS poisoning, abuse of SEO, etc.. However, when these threats are from the download or installation files directly - like many other attacks aimed double - a file that acts as an intermediary for the information representative (proxy information), is classified as a destructive device (malware) that steals data.
The characteristics of destructive devices (Malware) who steal data
The characteristics of destructive devices (Malware) who steal data
Do not leave any trace
* The device destroyer (Malware) like this are usually stored in the cache (cache) which periodically cleaned.
* Can be installed through the 'download without user knowledge' (drive-by download).
* The device destroyer (Malware) like this and have its web site (host) device destroyer (Malware) is usually live temporarily or a hoax.
Often changing and increasing function
* It is difficult for the virus-prevention software to track the nature of the cargo (payload) final because the circuit elements destroyer devices (Malware) change continuously.
* The device destroyer (Malware) like this level of encryption security using multiple files (multiple files encryption levels).
Tracking System prevents Tunneling (Intrusion Detection Systems [IDS]) after the installation is successful
* There is no weirdness with network that can be seen.
* The device destroyer (Malware) like this hiding in web traffic.
* More use of stealth in traffic and resources.
Secure block cipher disk (disk encryption)
* Data is stolen while pengawasandian secure (Decryption) and impressions.
* The device destroyer (Malware) like this can record typing, password and screen footage (screenshot).
Data Loss Prevention blocking (Data Loss Prevention [DLP])
* This leads to data protection is not running smoothly and result in imperfections in penengaraan metadata, not all identified.
* Pengacau can use encryption to secure memangkal (port) data.
Examples of destructive devices (Malware) who steal data
* Bancos: thieves are waiting for user information to open a banking site and then turned the page of the original bank site to a fake to steal sensitive information.
* Gator: surveillance device that monitors web browsing habits with a secret, and upload (uploading) data to the server for the investigation. Then, presenting his own pop-up ads are targeted (targeted pop-up ads).
* LegMir: spyware that steal personal information such as account names and passwords related to online games.
* Qhost: Trojan horse that turns the main file (hosts file) so that data can be transferred to a different DNS server as banking sites opened. Then, the page-entry list is open to steal false information-entry list of financial institutions.
{ 0 comments... read them below or add one }
Posting Komentar
Don't forget the comment, okay! :D