Explore chapters and articles related to this topic
Preventing Security Breach in Social Media: Threats and Prevention Techniques
Published in Lavanya Sharma, Mukesh Carpenter, Computer Vision and Internet of Things, 2022
The usage of social media websites is increasing to a great extent and on average a person spends more time on social media than any of the other online activities. So, privacy is a big concern and the only way to resolve the privacy and security issues is to make the audience aware of gathering details about how someone can be easily tricked through these applications. We have recommended ten solutions and precautions which can be taken care of while using social networks. We also request users to educate the surroundings regarding online threats. Users must be careful while sharing stuff, adding a new friend on social media as there is no way to identify the other user’s real identity. A great way of preventing these threats is keeping your systems clean—having no malware or virus (use antivirus) and software up to date. As far as future research is concerned social networks and other organizations are coming up with applications having an improved version of security features. In the end, our security is in our hands only; nevertheless having the state-of-the-art security solution could only help if we pay attention. Thus while using the social network correct precautions need to be taken by the user to preserve his security.
Malware Detection and Mitigation
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Gueltoum Bendiab, Stavros Shiaeles, Nick Savage
VirtualBox (https://www.virtualbox.org/) is a virtualization software that provides a controlled virtual environment to safely execute malicious software and analyze them without fear of infecting the real host. VirtualBox has a very good management of the snapshots, which are essential for malware analysis and testing. Mainly, VirtualBox helps malware analysts to: Decrease risk of infection by running the malware in a completely isolated environment.Control what gets in and out the network and prevent the malware from spreading to other machines in the network.Increase the analysis speed and therefore identify the type of malware quickly.
Upgrading Security
Published in Frank R. Spellman, The Drinking Water Handbook, 2017
Antivirus programs are designed to detect, delay, and respond to programs or pieces of code that are specifically designed to harm computers. These programs are known as malware. Malware can include computer viruses, worms, and Trojan horse programs (programs that appear to be benign but which have hidden harmful effects). Pest eradication tools are designed to detect, delay, and respond to spyware (strategies that websites use to track user behavior, such as by sending cookies to the user’s computer) and hacker tools that track keystrokes (keystroke loggers) or reveal passwords (password crackers).
Malware detection based on visualization of recombined API instruction sequence
Published in Connection Science, 2022
Hongyu Yang, Yupei Zhang, Liang Zhang, Xiang Cheng
Malware is software created by an attacker specifically to gain unauthorised access to a computer and damage or destroy it. According to the statistics of authoritative organisations, the number of terminals infected with malware in China in May 2022 has reached 4.78 million, the number of counterfeit website pages has reached 16,540, and nearly 90% of the vulnerabilities are used to implement remote attacks that can steal information and cause significant harm to businesses and individuals (Miao et al., 2021). The prevalence of malware has posed a grave threat to network security. Once national industrial systems are compromised, a large amount of information regarding the cyber assets of critical information and networked control systems will be leaked, posing hidden threats to the security of the national industrial sector (Cai et al., 2022). Therefore, it is economical to detect the malware at the early stage to reduce the damage by it (Gaurav et al., 2022), and it is imperative to conduct research on malware detection methods.
BYOD Policy Compliance: Risks and Strategies in Organizations
Published in Journal of Computer Information Systems, 2022
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah
This theme encompasses issues which describe the risks imposed on data residing in mobile devices or accessed through the devices.30,31,33,36,39 The rapid expansion of mobile devices is an opportunity for exploitation by malware authors. Cyber-attacks arise as 65% of Android users had declared their preferences to using pirated applications more than genuine ones.39 Unlike organization-owned devices which have security applications and controls, personal devices are susceptible to malicious attacks of applications and links. These devices are prone to malware attacks mainly because users’ neglect the importance of antivirus.31 Devices can become easily infected when a malicious link is clicked on tampered websites or social media sites.30 Such malicious programs would install in these unprotected devices and later easily bypass security perimeters, thereby causing the spread of malware into the corporate network. Malware can easily steal valuable information and spam to influence employees to expose personal information. Imgraben et al.30 found that devices using the ‘Remember Me’ feature to save passwords and credentials would be at risk of being compromised as the feature allows the attacker to obtain information from the devices easily.
Between privacy and security: the factors that drive intentions to use cyber-security applications
Published in Behaviour & Information Technology, 2021
Hadas Chassidim, Christos Perentis, Eran Toch, Bruno Lepri
Smart mobile devices are quickly becoming essential to daily life, trusted by users to hold everything from contacts and appointments to banking and retail transactions. At the same time, our dependence on these devices brings new security challenges, such as device hijack (Lala and Panda 2001) and Wifi-based man-in-the-middle attacks (Suo et al. 2013). Smartphones are also vulnerable to malicious software known as malware that spread through various means, by attaching themselves to useful mobile applications (Hern 2015), transmitted via SMS/MMS or via web-browsing (Suo et al. 2013), and through data collection tools hidden within smartphone apps (McCarthy 2009). As a result, people have growing concerns about the security and privacy of their mobile devices, including identity fraud and leakage of personal information (Clarke et al. 2016).