Page 12 - Cyber Safety C-5
P. 12

How Threats Conceal Themselves

                  Hidden threats are often designed to look harmless or even beneficial. They can
                  trick users into thinking they are safe, which makes them dangerous.

                  Some common ways threats hide include:



                      Fake websites: These websites  look  similar to

                       real ones  but  are created  to  steal  personal
                       information,  like passwords or credit  card

                       details.






                                                            Pop-up ads: Some ads appear while browsing,
                                                             claiming  to  offer free products  or services.
                                                             Clicking on these can lead to malicious software

                                                             being installed.






                      Phishing  emails: These emails  seem  like  they
                       are from trusted sources, like a bank or a popular

                       website, asking users to click on links or provide
                       personal details.






                                                            Malware: Malware can disguise  itself as a
                                                             harmless file or download. Once opened, it can

                                                             steal information, damage a device or control it
                                                             remotely.






                      Trojan horses: These are programs disguised
                       as legitimate software but secretly cause harm

                       by stealing data or giving attackers access to
                       your device.





                   10   Computer Science - V
   7   8   9   10   11   12   13   14   15   16   17