What are Online or Web Threats?
Would you share this Article with others?
Once a victim's computer is infected, it can be used to carry out malicious attacks on computer servers, infect other computers and steal the victim's personal information.
Malicious programs like viruses, spyware, and Trojan horses propagate when someone opens an infected e-mail attachment, downloads a malicious program or visits a website which is set up to take advantage of unpatched exploits in the user's computer operating system. One of the popular exploits is called “drive-by-download" or “drive-by”, which can infect someone’s computer by just visiting a website set up to do this.
There is another attack which does not involve a malicious program, but instead, tricks a user into entering their username, password, personal or credit card information on a fake website masquerading as a legitimate one. The links to these fake websites are sent in e-mails, text messages and posted on social networking websites. This type of threat is called Phishing and is used by scammers to lure victims to these websites, by using very attractive photos, offering ridiculous offers on almost everything and by other means.
With the ever-increasing number of people going online, scammers and hackers are finding new ways of carrying out their malicious activities. Check OnlineThreatAlerts.com daily for the latest online threats.
For more information about online / web threats, please go to http://en.wikipedia.org/wiki/Web_threat .
Note: Some of the names, addresses, email addresses, telephone numbers or other information in samples on this website may have been impersonated or spoofed.
Please share what you know or ask a question about this article by leaving a comment below. Check the comment section below for additional information, if there is any. Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: email@example.com. And, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent. Also, to quickly find answers to your questions, use our search engine.
You can help maintain Online Threat Alerts (OTA) by paying a service fee. Click here to make payment.
Comments, Questions, Answers, or Reviews
To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews.
Write Your Comment, Question, Answer, or Review
Write your comment, question, answer, or review in the box below to share what you know or to get answers. NB: We will use your IP address to display your approximate location to other users.