Explore chapters and articles related to this topic
An Overview about the Cyberattacks in Grid and Like Systems
Published in Fadi Al-Turjman, Smart Grid in IoT-Enabled Spaces, 2020
Adware is malicious software used to collect data on your computer usage and provide appropriate advertisements to you. While adware is not always dangerous, in some cases adware can cause issues for your system. Adware can redirect your browser to unsafe sites and can even contain Trojan horses and spyware. Additionally, significant levels of adware can slow down your system noticeably. Because not all adware is malicious, it is important to have protection that constantly and intelligently scans these programs.
Types of Computer Malware
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
So, an adware is a software code that is used to force the users to see a particular advertisement or promotional content on any website, pop-up window, or a commercial advertisement. The adware software programs are created by the hired programmers for a particular company, which pays the programmers for such codes.
Socially Engineering a Polarizing Discourse on Facebook through Malware-Induced Misperception
Published in International Journal of Human–Computer Interaction, 2022
Filipo Sharevski, Paige Treebridge, Peter Jachim, Audrey Li, Adam Babin, Jessica Westbrook
Conventional social engineering attacks target individuals’ assets, for example, passwords or system privileges. These assets enable social engineers to obtain unauthorized access so as to damage or exfiltrate confidential data. For this purpose, social engineers usually write various types of malware (e.g. adware, trojans, keyloggers, rootkits, etc.). The most common vector for malware delivery and installation is through “phishing,” that is, an e-mail or a text where the social engineers employ various principles of persuasion to secretly obtain the target individual’s compliance to run the malware code on their machine (Ferreira et al., 2015). The phishing campaigns can be massive and target the largest number of individuals possible or they can target specific and well-researched individual(s) (Hardy et al., 2014). Social engineering attacks are notoriously successful and abundant effort is invested in detecting suspicious content as well as training individuals to spot both massive and targeted or “spear” phishing e-mails (Alsharnouby et al., 2015; Khonji et al., 2013).
Effective classification of android malware families through dynamic features and neural networks
Published in Connection Science, 2021
Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli, Arcangelo Castiglione
For this reason, we would like to propose two possible future works. First of all, in order to improve the number of malware applications and the number of the considered families, we will update the proposed dataset by considering other malware datasets, such as: Android Adware and General Malware Dataset (AAGM Dataset) (Habibi Lashkari et al., 2017, august), AndroZoo (Allix et al., 2016), Genome (Zhou & Jiang, 2012) and so on. We did not include these datasets yet, because the analysis' process is costly and time-consuming. Second, we will propose new AI models based on the extracted static and dynamic features to improve the already achieved results. For example, a Recurrent Neural Network (RNN) based on Long Short-Term Memory (LSTM) layers could be a good method for use temporal features, such as timestamps. Moreover, the use of CNN autoencoders could be investigated to obtain important features by API-image based on the extracted static and dynamic information. Additionally, we will explore new DL approaches that will able to classify dynamic features as a film. More precisely, several combinations among LSTM layers, CNNs, and Stacked Autoencoders (SAEs) could be investigated to consider a single API-Image as a stream of sub-API-images by taking into account many sets of images obtained at fixed multiple temporal windows.
Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness
Published in Journal of Computer Information Systems, 2020
Alex Koohang, Alojzy Nowak, Joanna Paliszkiewicz, Jeretta Horn Nord
Information system vulnerability (i.e., OS command injection, SQL injection, buffer overflow, missing authorization, unrestricted upload of dangerous file types, reliance on untrusted inputs in a security decision, download of codes without integrity checks, weak passwords, and software infected with the virus among others) is the “ … weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source (see ref. 1, p. 87).” Information security threats are malware, phishing, proxies, spyware, adware, botnets, and spam among others. Information security threats are defined as “ … any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through a system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service (see ref. 1, pp. 85–86).”