SlideShare una empresa de Scribd logo
1 de 3
All about that Malware: 10 Myths debunked
Yes, we’ve written quite a lot about malware recently and we’re pretty sure that our regular readers have
grown to be quite the malware specialists by now. We mainly focused on what is malware, how it works and
how to prevent it from spreading, but we never really talked about all those misdirected beliefs that are
connected to it.
Want to find some tips that will help you spot differences between a Blue Screen of Death caused by a faulty
hardware and a real malware? The following list will take you through the 10 main misconceptions that regular
folk have about malware.
- Misconception #1: All recent cyberattacks are massive, have precise targets and inevitably end up
on the evening news
You may have heard about global cyberattacks caused by Petya or Wannacry or the even more recent hacking
incident concerning Equifax. In one year, these massiveattacks have made billions of victims allover the world,
being widely relayed by the media.
Does this mean that these large-scale cyberattacks are the only ones out there? Definitely not: millions of
multiple kinds of hacks per day are aiming at smalland large businesses alike,using techniques that range from
the smallest encrypting malware to the most vicious wiper type.
While every cyberattack is believed to be one of a kind and more and more sophisticated, let it be clear that
these hacks rely on the very same techniques more often than not.
- Misconception #2: Small and medium businesses are not an attractive target
You may think your business is too small to catch the attention of black hat hackers? Well, think again.
Even if they aren’t the most profitable, small and medium companies are really attractive to hackers because
they are an easy target. Indeed, they tend to have weaker cybersecurity measures in place (ifnone at all),using
poor encryption technologies and letting their data alarmingly unprotected.
- Misconception #3: You’ll inevitably know whether or not yourcomputer has been infected
If some types of malware provide visible signs of infection (such as ransomware that blocks your access to your
equipment or any other malware slowing down your computer, for instance),most of them operate completely
without your knowledge, running undetected in the background, sometimes for years at a time.
The only way to really know if your computer is infected is to run go beyond mere static cybersecurity
protection measures. Your antivirus might be able to detect known viruses, but what is to be done when a new
strain has infiltrated your device? This is where dynamic protection measures come in, in the form of UBA (User
The only way to really know if your computer is infected is to run go beyond mere static cybersecurity
protection measures. Your antivirus might be able to detect known viruses, but what is to be done when a new
strain has infiltrated your device? This is where dynamic protection measures come in, in the form of UBA (User
Behavior Analytics). To learn more, read our previous article on behavioral anomaly detection here.
 Misconception #4: Malware Is Just for Windows, your Mac is totally safe
One of the most well-known myths about malware is that Windows is the most and the only vulnerable OS.
Realistically speaking, Windows is indeed heavily targeted, but other platforms such as Mac, or even Android,
remain vulnerable to malware attacks.
In the past few years, a recent increase of Mac-oriented cyberattacks via cross platform malware has made
itself noticed. If you think about it, why would cybercriminals let billions of users go uncompromised just
because they’re not using Windows equipment?
 Misconception #5: You think you don’t have anything worth stealing on your personal computer
Sure, not everybody is James Bond and has all the MI6 secrets on his/her own laptop at home or even at work:
but still,even ifyou think you don’t have anything important stored on your hard drive, think again.Information
such as your email address, social networks passwords, or bank credentials can be used by hackers to target
you and those in your circle.
 Misconception #6: You don’t go on risky websites, so you’re probably safe, right?
Cybersecurity experts obviously advise you not to visit shady or risky websites as a security measure: while this
warning is truly great, it is important to understand that even reputable, legitimate websites can be
compromised. Indeed, some large, famous and thought-to-be secure websites such as Yahoo or The New York
Times have been known to be infected in the past months. To sum it all up: stay vigilant on every website that
you browse.
 Misconception #7: Email attachments from people you know are completely secure
Nowadays, internet best practices seemto have been assimilated by most people. For instance, it may appear
normal for everybody to be cautious about emails and attachments from strangers and to check twice before
downloading any kind of files sent to you by someone you don’t know. But it is also important is to think twice
when blindly opening emails from people you know too.
You might not want to be completely paranoid about all the thing you receive from friends and colleagues, but
just remember that hackers often amuse themselves by stealing users’ credentials and then sending malware
to all those in their address book.
 Misconception #8: Antivirus software will protect your computer from all malware
It’s a fact, no antivirus product is one hundred percent effective. Just read Misconception #3
- Misconception#10: You can restore all your data if you rememberedtoback-up your computer
“Oops,got malware?Wait,I’ll justwipe outall the data on my computer,reinstall myOSand voilà, my computerislike
brand new!”, said no one, ever. The process of restoring your data, even if it really exists, is not that simple.
If youbecome aransomware victimbutyouhave previously securedabackup,youcanresolvethe situationbyrestoring
all yourdata,that’strue;butit’ll bekindof like havinginsuranceon aphone andthengettingitstolen.Itmighteventually
be replaced, but in the meantime, someone has gone through all your photos, emails or messages.
To sum it all up: don’t believe everything you hear about malware and behave responsibly while on the internet,no
matterwhat. Tohelpprevent anycyberattacksin the firstplace,make surethatyou've got (atleast)anupdatedantivirus
program installed and that you are aware of hackers’ tricks coming your way, such as phishing emails.
Also, think about having your data backed-up and remember to follow cybersecurity best practices, even if they
sometimes may appear tedious. One thing’s for sure: it is us that will have to adapt in the face of the relentless threat
hacking.

Más contenido relacionado

Más de ITrust - Cybersecurity as a Service

Más de ITrust - Cybersecurity as a Service (20)

Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 
Reveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FRReveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FR
 
Reveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet ENReveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet EN
 
Reveelium Data Science as a Service - Datasheet FR
Reveelium Data Science as a Service - Datasheet FRReveelium Data Science as a Service - Datasheet FR
Reveelium Data Science as a Service - Datasheet FR
 
Reveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet ENReveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet EN
 
ITrust Cybersecurity as a Service FR
ITrust Cybersecurity as a Service FRITrust Cybersecurity as a Service FR
ITrust Cybersecurity as a Service FR
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
 
Le côté obscur de la cybersécurité
Le côté obscur de la cybersécuritéLe côté obscur de la cybersécurité
Le côté obscur de la cybersécurité
 

Último

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 

Último (20)

Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 

All about that Malware: 10 Myths debunked

  • 1. All about that Malware: 10 Myths debunked Yes, we’ve written quite a lot about malware recently and we’re pretty sure that our regular readers have grown to be quite the malware specialists by now. We mainly focused on what is malware, how it works and how to prevent it from spreading, but we never really talked about all those misdirected beliefs that are connected to it. Want to find some tips that will help you spot differences between a Blue Screen of Death caused by a faulty hardware and a real malware? The following list will take you through the 10 main misconceptions that regular folk have about malware. - Misconception #1: All recent cyberattacks are massive, have precise targets and inevitably end up on the evening news You may have heard about global cyberattacks caused by Petya or Wannacry or the even more recent hacking incident concerning Equifax. In one year, these massiveattacks have made billions of victims allover the world, being widely relayed by the media. Does this mean that these large-scale cyberattacks are the only ones out there? Definitely not: millions of multiple kinds of hacks per day are aiming at smalland large businesses alike,using techniques that range from the smallest encrypting malware to the most vicious wiper type. While every cyberattack is believed to be one of a kind and more and more sophisticated, let it be clear that these hacks rely on the very same techniques more often than not. - Misconception #2: Small and medium businesses are not an attractive target You may think your business is too small to catch the attention of black hat hackers? Well, think again. Even if they aren’t the most profitable, small and medium companies are really attractive to hackers because they are an easy target. Indeed, they tend to have weaker cybersecurity measures in place (ifnone at all),using poor encryption technologies and letting their data alarmingly unprotected. - Misconception #3: You’ll inevitably know whether or not yourcomputer has been infected If some types of malware provide visible signs of infection (such as ransomware that blocks your access to your equipment or any other malware slowing down your computer, for instance),most of them operate completely without your knowledge, running undetected in the background, sometimes for years at a time. The only way to really know if your computer is infected is to run go beyond mere static cybersecurity protection measures. Your antivirus might be able to detect known viruses, but what is to be done when a new strain has infiltrated your device? This is where dynamic protection measures come in, in the form of UBA (User
  • 2. The only way to really know if your computer is infected is to run go beyond mere static cybersecurity protection measures. Your antivirus might be able to detect known viruses, but what is to be done when a new strain has infiltrated your device? This is where dynamic protection measures come in, in the form of UBA (User Behavior Analytics). To learn more, read our previous article on behavioral anomaly detection here.  Misconception #4: Malware Is Just for Windows, your Mac is totally safe One of the most well-known myths about malware is that Windows is the most and the only vulnerable OS. Realistically speaking, Windows is indeed heavily targeted, but other platforms such as Mac, or even Android, remain vulnerable to malware attacks. In the past few years, a recent increase of Mac-oriented cyberattacks via cross platform malware has made itself noticed. If you think about it, why would cybercriminals let billions of users go uncompromised just because they’re not using Windows equipment?  Misconception #5: You think you don’t have anything worth stealing on your personal computer Sure, not everybody is James Bond and has all the MI6 secrets on his/her own laptop at home or even at work: but still,even ifyou think you don’t have anything important stored on your hard drive, think again.Information such as your email address, social networks passwords, or bank credentials can be used by hackers to target you and those in your circle.  Misconception #6: You don’t go on risky websites, so you’re probably safe, right? Cybersecurity experts obviously advise you not to visit shady or risky websites as a security measure: while this warning is truly great, it is important to understand that even reputable, legitimate websites can be compromised. Indeed, some large, famous and thought-to-be secure websites such as Yahoo or The New York Times have been known to be infected in the past months. To sum it all up: stay vigilant on every website that you browse.  Misconception #7: Email attachments from people you know are completely secure Nowadays, internet best practices seemto have been assimilated by most people. For instance, it may appear normal for everybody to be cautious about emails and attachments from strangers and to check twice before downloading any kind of files sent to you by someone you don’t know. But it is also important is to think twice when blindly opening emails from people you know too. You might not want to be completely paranoid about all the thing you receive from friends and colleagues, but just remember that hackers often amuse themselves by stealing users’ credentials and then sending malware to all those in their address book.  Misconception #8: Antivirus software will protect your computer from all malware It’s a fact, no antivirus product is one hundred percent effective. Just read Misconception #3
  • 3. - Misconception#10: You can restore all your data if you rememberedtoback-up your computer “Oops,got malware?Wait,I’ll justwipe outall the data on my computer,reinstall myOSand voilà, my computerislike brand new!”, said no one, ever. The process of restoring your data, even if it really exists, is not that simple. If youbecome aransomware victimbutyouhave previously securedabackup,youcanresolvethe situationbyrestoring all yourdata,that’strue;butit’ll bekindof like havinginsuranceon aphone andthengettingitstolen.Itmighteventually be replaced, but in the meantime, someone has gone through all your photos, emails or messages. To sum it all up: don’t believe everything you hear about malware and behave responsibly while on the internet,no matterwhat. Tohelpprevent anycyberattacksin the firstplace,make surethatyou've got (atleast)anupdatedantivirus program installed and that you are aware of hackers’ tricks coming your way, such as phishing emails. Also, think about having your data backed-up and remember to follow cybersecurity best practices, even if they sometimes may appear tedious. One thing’s for sure: it is us that will have to adapt in the face of the relentless threat hacking.