Cyber Threats
There are many things that hackers can do to exploit vulnerabilities in a system. These include installing viruses and malware, phising/spear phishing, DDoS, spoofing, and social engineering.
Viruses can be downloaded on your computer- once downloaded, they will start infecting your files and system, and can even make copies of themselves- they can sometimes be hard to detect.
Malware is similar to a virus- it is any piece of software that hackers install into a computer system to delete your files and cause damage to your computer. Ransomware is a type of malware where the hacker will demand ransom (money) in order for the user to gain access to their personal data.
Continue