- Trojan- Trojan encompasses a wide range of computer viruses and malware. The common characteristic of all Trojans is their ability to present themselves as vital system software. They can easily hide their presence from common anti-virus software and are categorized on the basis of their operation. Some of the commonly encountered Trojans are backdoors, rootkits, downloaders, RATs and droppers among others.
- Phishing- Malware designed around social engineering is one of the most popular forms of attacks today. The user or company employee is somehow how fooled into opening a malicious link or attachment which turns out to be a Trojan. There are also innocuous looking websites which lure users into downloading malware. Most of the emails that an account receives amount to spam. Sometimes through clever phishing techniques malicious content takes on the appearance of a well-established website. This tricks the user into entering their user ID and password for that legitimate website. Their account details are then immediately transferred to the criminal who can choose to abuse it or sell it on online black markets.
- Ransomware's- Ransomware have attained the limelight in the recent times due to some of the most damaging and high-profile attacks in the recent times. The attack typically involves the attacker gaining access to confidential information and accounts and encrypting it. This causes the business or user to lose access to the information. The attacker then asks for ransom usually in the form of cryptocurrency for the encryption key. Ransomware's also followed the basic principles of Trojan in the fact that they resemble harmless links or software and fool the user into downloading them.
Employing the most advanced security features involve securing both hardware and software resources. Companies must consciously generate awareness about the various dangers of cybercrime and train their employees accordingly.