search instagram arrow-down



February 2017
    Mar »
Follow Autumn Thoughts on

Follow Us

Introduction: –

Internet, web, or worldwide web is the interconnected network which links the people to millions of sites from across the globe. It is so widespread, that it’s used by 3.2 billion people, which is almost half of the total world population. In the past two decades, internet usage has increased twenty times as compared previously. But, as they say “beauty belongs to the dangerous”. With this diverse network also comes numerous threats which at times, put your personal data and information at stake.

5. Phishing

Number 5 on this list, comes “Phishing.” As you may have guessed, this metaphor is derived from the word fishing, which means to lure in the catch. Experts describe it as a fraudulent method in which a person (hacker) tries to login to your account, regardless of the site by trying to portray as a reputable person on social networking or your email sites. You may receive an email from a reputable, but fake organization or a person with a link that causes you to install a malware on your computer. In turn, you leak your account data, personal information or passwords to that entity. This technique is popular amongst cyber criminals as it is easier to imply on the users, instead of breaking through the security systems.

4. Pharming

Next on this list, comes a technique known as “Pharming”. It is a sort of phishing, but this time without the lure. A fraudulent code is installed in your system, that misleads you do sites without your consent. Unlike phishing, the user directs himself to these sites without himself being aware of it. This can affect several personal computers at a time, and modifies the files by converting the URLs into formats that the system uses to access the sites. One type of pharming known as “DNS poisoning” modifies the files and takes you to the fraudulent sites that may appear genuine. It happens due to the interference occurring with the DNS server, as the name suggests.

3. Spam

Now, this is a major problem for most of the internet users. Seldom happens, that a user does not come across a spam email. Apparently, it is an unsolicited message, mainly for the purpose of advertising sites, products but in this case promoting malware to your personal computer and other devices. Part of the cost is paid by the user to maintain the demand supply curve of the World Wide Web. It is sent across a list of millions of specific email ids and there is a very small proportion of users that actually responds. It causes you to install malware that leads to the exposure of personal account details etc.

2. Botnet

It is also commonly known as “zombie army” and causes you to unintentionally forward malwares, messages and transmissions to other personal computers. Such computers are called as “bots” (coming from the word robot), as they adhere to the command of another master or a virus generator. These are more effective, when the users do not have a genuine firewall protection and are mainly transmitted from home based personal computers.

1. Hacking

Now, I saved the most common one for the last. Who hasn’t heard of hacking? In simple words, it is defined as unauthorized access to the user’s personal account information etc. The person who carries out this rather notorious action is known as a hacker. This is the possibly the biggest problem being faced by internet users in the modern era. By using various programming techniques and skills, the hacker gains access to the user’s email or social network details. In some cases it is also used by the government and national organizations for various security purposes.   


Leave a Reply
Your email address will not be published. Required fields are marked *

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: