THE DANGERS ON THE INTERNET

  • Dangers on the Internet- let’s meet our enemy

    ( a concise compilation of the dangers on the Internet written by the Polish team)


    We can encounter many dangers , we can be attacked using internet every day. Can we protect ourselves? At least we should know what the attacking ways are.  Here is a list of potential dangers which we should we be aware of when being online. 


    Viruses –- this is usually malicious software, which is distributed in any way without the user's knowledge and consent. It can lead to theft or destruction of data, and also make it impossible to work on your computer. 


    Worms - They are similar to viruses, but they only spread through the Internet. They are often duplicated by email.


    Trojans - the kind of software that appears under the guise of a friendly application that you want to have. In fact, it can hinder your anti-virus programs and increase the risk of installing spyware.
    Backdoor - A vulnerability in your system that allows you to break into your computer to take over your data or install malware.


    Spyware - used to collect information about a user without his knowledge.


    Phishing – Is an internet fraud that involves impersonating another person or institution for phishing, such as signing in.


    Clickjacking – This is a method often used in social networking sites. An online attack that aims to get the user to unknowingly click.


    Wabbit – This is a resident program that does not duplicate itself over the network. It works, for example, on duplicating the same file until the computer runs out of memory.


    Scumware – This way, you determine the software that performs unwanted changes on your computer.


    Stealware/parasiteware – A computer program that tracks user activity on the web. At the time of making a payment, change the account number to which the money is to be credited.


    Adware – Program used to display ads, often without the user's consent, making it difficult to operate the computer.


    Hijacker Browser Helper Object – A browser plugin that can make various changes without the user's knowledge.


    Rootkit – The tool most often used by hackers to break into a computer system. Sometimes it takes control over the computer to take over.


    Keylogger – Software that memorizes the keys pressed by the user. It is used to capture passwords, codes or other important data.


    Dialer – A computer program for connecting to the Internet via a modem. It often happens to be unaware of the dialer installation, for example when downloading mp3 files, resulting in an increase in the cost of the internet charge.