
The characteristics of destructive devices (Malware) who steal data
Do not leave any trace
* The device destroyer (Malware) like this are usually stored in the cache (cache) which periodically cleaned.
* Can be installed through the 'download without user knowledge' (drive-by download).
* The device destroyer (Malware) like this and have its web site (host) device destroyer (Malware) is usually live temporarily or a hoax.
Often changing and increasing function
* It is difficult for the virus-prevention software to track the nature of the cargo (payload) final because the circuit elements destroyer devices (Malware) change continuously.
* The device destroyer (Malware) like this level of encryption security using multiple files (multiple files encryption levels).
Tracking System prevents Tunneling (Intrusion Detection Systems [IDS]) after the installation is successful
* There is no weirdness with network that can be seen.
* The device destroyer (Malware) like this hiding in web traffic.
* More use of stealth in traffic and resources.
Secure block cipher disk (disk encryption)
* Data is stolen while pengawasandian secure (Decryption) and impressions.
* The device destroyer (Malware) like this can record typing, password and screen footage (screenshot).
Data Loss Prevention blocking (Data Loss Prevention [DLP])
* This leads to data protection is not running smoothly and result in imperfections in penengaraan metadata, not all identified.
* Pengacau can use encryption to secure memangkal (port) data.
Examples of destructive devices (Malware) who steal data
* Bancos: thieves are waiting for user information to open a banking site and then turned the page of the original bank site to a fake to steal sensitive information.
* Gator: surveillance device that monitors web browsing habits with a secret, and upload (uploading) data to the server for the investigation. Then, presenting his own pop-up ads are targeted (targeted pop-up ads).
* LegMir: spyware that steal personal information such as account names and passwords related to online games.
* Qhost: Trojan horse that turns the main file (hosts file) so that data can be transferred to a different DNS server as banking sites opened. Then, the page-entry list is open to steal false information-entry list of financial institutions.
{ 0 comments... read them below or add one }
Posting Komentar
Don't forget the comment, okay! :D