Cybercraig’s List of the Top Cyber Malware Threats to Lookout for in 2019

Posts by: Tim Orlander

Malware Threat phishing hook and login credentials

Cyber crime is always morphing and taking on new forms since technology is always evolving so fraudsters are constantly looking for new opportunities and always coming up with new ways to exploit internet users.

Their one goal is to have the biggest impact in the shortest amount of time so that the risk of them being caught is low.

Creating a Malware is the hard part but distributing it is relatively easy considering around 75 percent of websites on the internet have security vulnerabilities. This high amount leaves all of us at risk. A report found that there were around one million attacks on users every day!

Here are a few examples of the biggest malware threats to look out for in 2019.

Key Logging

Identity theft via Key logging is one of the common attacks online today. The hacker can install a piece of Spyware on your computer and this allows them to log every keystroke made on your computer, especially on dangerous when logging on to your online banking or financial websites.

Many online banking sites have tried to over come this by introducing different logging in styles such as using memorable information so that only the owner of the account would know it. This works by the website requiring random parts of a memorable word to be entered rather than the whole details

for example:
Enter the 4th ,7th and 9th character of your memorable word.

This combination would change every time and will be completely random. Returning jumbled up letters, however; it’s only a matter of time though before the keylogger can work this out, especially if the hackers are able to capture the computers screen.

Spear-Phishing

Another growing trend among hackers that’s worth mentioning is Spear-Phishing.  A more advanced version of the more commonly known regular phishing. It works the same way, but Spear-Phishing targets a smaller group of people, usually within an organization. The standard procedure with this type of threat is to gather the information on a company’s email address format, then search for a group of names of employees or executives within the organization. What the phisher can then do is to send an email that is realistic enough to dupe the employees into giving out private information. To make it even more tempting for the recipient to bite is to make it look like the email came from an official with authority within the business.

You can protect yourself from these types of threat by having an up to date antivirus installed on your computer, you can find a list of the top 8 antivirus products here