Another reason of this tragedy is due to high unauthorized downloading of films, music and photos of celebrities. As one of the example happen in
-William Hong Weei Loon – “Precaution Is Better Than Cure’
Another reason of this tragedy is due to high unauthorized downloading of films, music and photos of celebrities. As one of the example happen in
Firefox is one of the secure browsers according to a number of sites that have tested. By using a more secure browser can help protect against from hijacking.
Reading the few safeguards above, may instill paranoia even in the most fearless web user. Remember, the use of the internet is a great way to make your life easier and can be a safe place as long as you follow some simple common sense rules. We must realize that the people in cyberspace are the same people you encounter every day in the physical reality. Even if you never use a computer, your identity can still be stolen from the paper that your throw out in your trash!
Microsof web page -Pharming: Is your trusted Web site a clever fake?
Economictimes web page - Pharming attack is a new security threat
Wikipedia web page - About phishing
Privacy rights web page -"Phishing" Emails Attempting to Capture Your Personal Information
Online have gave us a lot of convenient such as making online transactions on paying bills, online shopping, look for informations, etc. Sadly the online security had become an issue recently. As for the most famous threat is Trojan attack, Daniel G. James analyzes that the Trojan attack had been increase, from 2004 till 2006.
Trojan Infections from 2004 - mid of 2006
Statistical Analysis of Internet Security Threats by Daniel G. James
Online Threats is separated to 2 categories which are technical attacks and non technical attacks. Technical attack basically is the need of knowledge to create certain software or program to form a threat. Whereby non technical attacks is using tricks to make users to disclose certain information the attacker wants.
Virus, Trojan horse, worm, Macro Virus are all technical attacks. During May 2000, there was 1 famous worm which named “I LOVE YOU”, where a small piece of code attached to the email (Business Software Alliance) . When user opens the file, it will send an email to everyone in the address book, subsequently causes the victims’ machines to be damaged by overwrite the important files (Wikipedia). This worm started from
One of the most famous non technical attack threats is Phishing. Phishing is intent to cheat a user for sensitive information by using a trustworthy entity in an electronic communication. Bank always been targeted in Phishing, an example of phishing email are such as below.
digressive | |
Definition: | Tending to depart from the main point or cover a wide range of subjects. |
Synonyms: | excursive, rambling, discursive |
While the laughter of joy is in full harmony with our deeper life, the laughter of amusement should be kept apart from it. The danger is too great of thus learning to look at solemn things in a spirit of mockery, and to seek in them opportunities for exercising wit.
Lewis Carroll (1832-1898) |