Dangerous applications - programs created to operate unauthorizedly on devices, causing issues such as data theft, system damage, or unwanted advertisements.
Backdoor
Gap intentionally left by the author of the software for the purpose of later exploiting it.
Logic Bomb
Malicious code designed to execute a harmful action when specific conditions are met.
DDoS (Distributed Denial of Service)
It is one of the most common attacks on computer systems or network services. The whole point of this attack is to occupy all available and free resources of a computer, this action prevents the use of the computer (or network service, for example videogame servers or even home routers).
Exploit
Program which exploits existing vulnerabilities in software so that cybercriminilas can take control of a device or force it to perform their desired operations.
Data theft
It refers to the unauthorized or illegal acquisition of sensitive or confidential information from a person or organization. This stolen data can include personal information such as names, addresses, social security numbers, credit card numbers, or any other information that can be used for identity theft, financial fraud, or other malicious purposes. It can occur through various means, including hacking into computer systems or networks, exploiting software vulnerabilities, phishing attacks or simple physical theft of the device.
Botnet
A network of compromised computers controlled by a central server, often used for malicious activities such as distributed denial-of-servic(DDoS) attacks.
Browser Hijacker
Software that alters a web browser's settings without the user's consent, often redirecting searches or displaying unwanted advertisements.
Business Email Compromise (BEC)
A type of cyberattack where attackers impersonate company executives to trick employees into transferring money or sensitive information.
Phishing
With its name derived from fishing, where the attackers cast a wide net (for example phising emails) in hopes of catching unsuspecting victims. Phishing is a type of cyberattack in which attackers use fraudulent emails, text messages, or other forms of communication to trick individuals into divulging sensitive information such as usernames, passwords, credit card numbers, or other personal or financial data.
False Domains
Websites created to impersonate legitimate ones, often used for phishing or other fraudulent purposes.
Gray Hat
A hacker who operates between ethical and unethical behavior, sometimes breaking laws or ethical guidelines for non-malicious purposes.
White Hat
Ethical hackers who use their skills to improve security by identifying vulnerabilities and assisting in patching them.
Jamming
Disrupting wireless communications by transmitting interference signals on the same frequency.
JavaScript Injection
Inserting malicious JavaScript code into web pages to exploit vulnerabilities and compromise user data.
Keylogger
Software or hardware that records keystrokes on a computer, often used to capture sensitive information such as passwords.
Trojan horse
It is a type of malware whose name perfectly describes its operation. They masquerade as useful applications or programs, giving the impression of being beneficial. In reality, they perform many harmful actions, such as installing backdoors, spyware, or encrypting data on the victim's computer to prevent access (ransomware).
Identity Theft
Stealing someone's personal information to impersonate them for fraudulent purposes.
Kruegerware
Malware that can regenerate itself even after removal, making it difficult to eradicate.
Likejacking
Deceptive techniques used to trick users into clicking on social media buttons disguised as something else.
Password Spraying
Attempting to gain unauthorized access to multiple accounts by using a few commonly used passwords.
Pharming
Redirecting website traffic to fraudulent sites by tampering with DNS servers or altering hosts files.
Ransomware
Malware that encrypts files or locks computer systems, demanding payment for their release.
Rootkit
Software designed to conceal malware or unauthorized access on a computer system.
Scam
Deceptive schemes designed to defraud individuals or organizations of money or valuable information.
Spoofing
Impersonating another person, device, or entity to gain unauthorized access or deceive users.
Vishing
Phishing attacks conducted via voice calls, often impersonating legitimate organizations or individuals.
Pharming
Redirecting website traffic to fraudulent sites by tampering with DNS servers or altering hosts files.
Sextortion
Extorting individuals by threatening to reveal sensitive or embarrassing information, often obtained through hacking or phishing.
Skimming
Illegally capturing payment card data from magnetic stripes, usually at point-of-sale terminals.
Smishing
Phishing attacks conducted via SMS or text messages, often containing malicious links or requests for personal information.
Spam
Unsolicited and often unwanted email messages, typically sent in bulk for advertising or fraudulent purposes.
Spyware
Software that secretly collects information about a user's activities or monitors their behavior without their consent.
Malware
Any type of malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.
Stealware
Malicious software designed to steal affiliate marketing earnings or redirect payments to attackers.
Tabnabbing
Exploiting browser tab switching to trick users into entering sensitive information on phishing sites.
How to prevent these types of dangerous applications:
Antivirus
The most common and simple method is to install an antivirus software on your computer. The antivirus is updated with the latest information about viruses.
Recognition Methods
To able to recognize harmful applications, look for unexpected system behaviors, unauthorized changes in settings, or unknown applications installed on the device. For example: keep the system updated, check if the system is verified, do not download anything from suspicious looking websites.