Page 12 - Cyber Safety C-5
P. 12
How Threats Conceal Themselves
Hidden threats are often designed to look harmless or even beneficial. They can
trick users into thinking they are safe, which makes them dangerous.
Some common ways threats hide include:
Fake websites: These websites look similar to
real ones but are created to steal personal
information, like passwords or credit card
details.
Pop-up ads: Some ads appear while browsing,
claiming to offer free products or services.
Clicking on these can lead to malicious software
being installed.
Phishing emails: These emails seem like they
are from trusted sources, like a bank or a popular
website, asking users to click on links or provide
personal details.
Malware: Malware can disguise itself as a
harmless file or download. Once opened, it can
steal information, damage a device or control it
remotely.
Trojan horses: These are programs disguised
as legitimate software but secretly cause harm
by stealing data or giving attackers access to
your device.
10 Computer Science - V

