247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

A guide to online security threats

by Josef Kafka

The Apple vs FBI saga helped highlight an interesting debate when it comes to our security. On the one hand we have the argument for physical security against criminal activity, which the FBI embodied, and on the other, we have the information security of the entire internet-using population threatened, which was Apple's position on the matter. The saga was not just about Syed Farook's privacy, it was about the privacy of every single one of us.

It is a tricky case, there is no doubt about it, but there is some positive in that it is bringing these issues of data security and encryption into the limelight. The Apple vs FBI case has got us talking about the very real, ever present need for privacy online and how we go about achieving this and that is so important. We think that the best place to start in fully understanding your online security is looking at the biggest threats to it and how to go about avoiding them. We have compiled some of the most common here, for you to have a think about.

Email spam

Spam – or unwanted – email accounts for around 50% of all emails sent. In and of itself, spam mail isn't necessarily harmful, but it can be used to send malware. Spam mail is also often very well hidden, under the guise of sales emails, which means you need to be extra alert as to which links you are opening. Spam can be very convincing and the best tip is that if something seems too good to be true, it probably is. If anything seems out of place, be very wary about it.

Phishing

Phishing is essentially the fraudulent acquiring of passwords and personal data such as credit card details. As you can imagine, online banking, shopping and auction sites are the most likely to be at risk of this type of activity, because they hold so much valuable information. The most common way phishing occurs is where an official looking email is sent out from a supposedly trusted sender, which then convinces the user to give over personal details. Again, just as with spam email, this is a case of being ever vigilant. Be aware that banks will never email you asking you to change your password for online banking and, if you do receive contact from them that seems at all suspicious, get in touch with them directly to double check.

Pharming

This is one step up from phishing where, as well as impersonated emails, pharmers will create entire fake websites that look identical to the official website. Users will then put in their information, believing the fake site to be the official. Double check URLs, look for security systems and, again, don't click if you feel uneasy. 

Botnets

Botnets are responsible for the spam email and spreading of malware that we discussed above. They are robots (or 'bots') that distribute spam emails which have viruses attached. They can also then use your system as part of an attack on another system. Botnets largely go undetected, which is why you may not have heard of them. Small but mighty, they can do a lot of damage.

Distributed Denial-of-Service (DDoS) attack

As mentioned above, botnets can use your computer to help attack another server. This works because websites can only process a certain number of requests before it crashes. When a bot has an army of computers under its control, it asks them all to go to one specific URL, overloading it and meaning that it can not then process the usage requests from other legitimate users. This therefore brings the server down. To prevent this from happening, you need to be vigilant with your computer security and be careful about attachments you open from unknown senders. If you do notice any issues, such as slow internet usage,  contact your service provider for help, as this may be down to a DDoS.

Malware

We have mentioned malware several times already – but what exactly is it? It is malicious software (hence 'malware') which has the ability to affect your computer and be used in attacks on other servers or for information theft. Malware can include computer viruses, worms, Trojan horses, spyware and adware – basically, anything that wants to harm your device. Malware can be very powerful, sending emails on your behalf, altering or deleting files and stealing sensitive information, among other things. 

With so many threats on our security from unwanted sources, Apple is rightly taking the creation of a universal master key, which could gain access to any iPhone device, very seriously. The master key would be being created for beneficial purposes in this instance, but if it strays into the wrong hands – as technology inevitably tends to do – there could be huge ramifications.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu