Top 10 summer security threats

The weather's been so poor many of you will have spent your days indoors on the web, so here are some security tips to keep you safe this summer.

People like students have more time on their hands on holidays, and are more easily persuaded to click links to fake news reports and videos to stay to date with events.

It recently happened with the death of Michael Jackson. A lot of spam came through which asked users to click on videos of the pop star.

Usually when a user clicked, there was no video to be seen, but they were infected. It also recently happened with the solar eclipse event.

"This isn't just something that happens in the summer, but is very, very popular," Sancho said.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

3 - Search results

Criminals target popular search results involving news events, poisoning' them.

These results will be positioned very high on Google results, and when a user clicks on them and they are redirected to a malicious site.

This happened recently with the Farrah Fawcett death, the Swine Flu pandemic, and the Air France plane crash of Flight 447.

2 - High-traffic websites

This is simply criminals breaking into websites and planting malicious code. This way, real websites can redirect users to bad ones so they don't even notice.

Advertisement - Article continues below

If you were accessing a real site with an outdated browser a user can end up being automatically infected in this way.

"It is a legitimate site, so this is really, really dangerous," said Sancho. "That is happening every day. A real infection vector."

Sancho said that it was huge problem as users often don't update their browsers.

1 - Social networking

Advertisement
Advertisement - Article continues below

The summer sees users using social networks like Facebook and Twitter to connect with their friends and family, which criminals have seen and targeted accordingly.

"If somebody gets infected and logs in to Twitter or Facebook, the trojan manages to change the status or tweets and point them to bad links," said Sancho.

Advertisement - Article continues below

"After that person has been infected, their friends on the social networks will see the link and click on it since they trust them."

He said that although social networks have put in security controls, they will keep being targeted as infections were very difficult to stop.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019