What are Online or Web Threats?
Would you share this Article with others? +
Once a victim's computer is infected, it can be used to carry out malicious attacks on computer servers, infect other computers and steal the victim's personal information.
Malicious programs like viruses, spyware, and Trojan horses propagate when someone opens an infected e-mail attachment, downloads a malicious program or visits a website which is set up to take advantage of unpatched exploits in the user's computer operating system. One of the popular exploits is called “drive-by-download" or “drive-by”, which can infect someone’s computer by just visiting a website set up to do this.
There is another attack which does not involve a malicious program, but instead, tricks a user into entering their username, password, personal or credit card information on a fake website masquerading as a legitimate one. The links to these fake websites are sent in e-mails, text messages and posted on social networking websites. This type of threat is called Phishing and is used by scammers to lure victims to these websites, by using very attractive photos, offering ridiculous offers on almost everything and by other means.
With the ever-increasing number of people going online, scammers and hackers are finding new ways of carrying out their malicious activities. Check OnlineThreatAlerts.com daily for the latest online threats.
For more information about online / web threats, please go to http://en.wikipedia.org/wiki/Web_threat .
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Check the comment section below for additional information and share what you know or ask a question about this article by leaving a comment below.
Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: firstname.lastname@example.org. And, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent. Also, to quickly find answers to your questions, use our search
Click here help maintain Online Threat Alerts (OTA).
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews.
Write Your Comment, Question, Answer, or Review
NB: We will use your IP address to display your approximate location to other users.