What are they designed for?
Designed to detect and destroy computer viruses
What is malware
A software designed to steal info and damage the computer.
In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law or criminal law, or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong.
What is Phishing
the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
What is a hacker?
A hacker is an individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
They are usually bought in app stores or on browsers.
How do you get malware?
Malware is usually distributed through malicious websites, emails, and software.
What is Email Scams?
What is spear phishing?
Spear phishing targets a specific group or type of individual
What are white hat hackers?
A White Hat hacker tests systems and networks by trying to break into them. They are hackers, but their talents are being used to improve Cyber Security.
Why should you get an antivirus?
To protect your computer from any dangerous breaches of personal info.
How to prevent malware?
An antivirus app is the best way to automatically clean your system of viruses and malware.
What are Phone Call Scams
These scams are conducting by people or bots. They call you telling you like your car warranty is over due or that you have taxes that you don't know you had to pay for.
What is Smishing?
Smishing is an attack that uses text messaging or short message service (SMS) to execute the attack. A common smishing technique is to deliver a message to a cell phone through SMS that contains a clickable link or a return phone number.
What are grey hat hackers?
Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.
How much do they usually cost?
Standard antiviruses cost 30-40 dollars
How do hackers use malware
They send emails on which people click on and they accidentally download something leading to their info being taken.
Why are scams conducted?
Scams run in corporations. They scam in order to take your identitie or to take all of your money.
How to prevent phishing?
Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet. Emails and Internet pages created by phishers may look exactly like the real thing.
What are black hat hackers?
Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information.
Where did antivirus originate from?
The beginnings of antivirus software date back to 1971, when the first computer virus known as the Creeper infected and spread to PDP-10 mainframe computers manufactured by Digital Equipment Corporation (DEC). In order to combat the Creeper, American computer programmer Ray Tomlinson developed the Reaper.
What is the origin of malware
Examples of malware attacks date back several decades to the early days of the first personal computers. The first PC-based malware attack, “Brain,” was released in 1986 and infected the original 5.2" floppy disks of IBM Personal Computers.
What pre cautions do you take to not get scammed
Don't click on emails that you don't where there from. Don't accept unknown caller calls, and if you d hang up immediately. Don't click on pop up ads.
Where did Phishing originate from?
Early phishing techniques can be traced back to the 1990s, when black hat hackers and the warez community used AOL to steal credit card information and commit other online crimes.
Why is hacking without permission illegal?
Hacking may lead to criminal charges when a hacker accesses someone else's computer system without consent. For example, a hacker may use a phishing scam to install malware on a computer network. They may also install computer programs, allowing them to commit identity theft or steal confidential information.