Advertisment

Data breaches and malware are the top threats of an organization

eScan has studied on a recent poll that says 32pc of the top IT professionals agreed that data breaches and malware are the threats that organization faces

author-image
Sanghamitra Kar
New Update
insider threats

BANGALORE, INDIA: eScan has studied on a recent poll that says 32pc of the top IT professionals agreed that data breaches and malware are the top threats that any organization faces.

Advertisment

Let us see how malwares are baring their heinous fangs to cripple different sectors of IT industry.

Malware threat to Virtual Currencies: Extensive research has found that virtual transactions could result in entrenchment with malware and other prohibited data like child abuse images, pornographic content etc. The design of blockchain (sequential transaction database found in cryptocurrencies) is responsible for the malware to be injected and hosted permanently. As a result the 'cyber hygiene' gets seriously affected and it becomes an ideal place to host unlawful data or images.

Malware attack to Chat rooms: Cyber criminals are always trying to target various Chat-rooms. These are always a matter of entertainment to the kids and teens resulting in easy access for the crooks to convert the chat session into a cyber-trouble. However, there are some genuine chat-rooms which are useful. The guardians' role is important here. They need to teach their kids about how to remain safe from these hazards. The children should learn not to enter any unauthorized chat-rooms that might appear as a pop-up!

Advertisment

Malware target hotel Wi-Fi: Hotel Wi-Fi is sometimes prone to malware attack. Such vulnerability gives a chance for the malware to get injected into the guests' devices. It can even monitor and steal data transferred over the network if not properly secured.

Macro-based Malware: This is a series of commands gathered together as a single command to complete a task automatically. The culprits grab this capability and figure out how to compose malware-laden macros. These start to run immediately after the file is opened; the victim who opens the file remains unaware that anything unnatural happened to his/ her system.

"NewPosThings" Malware: Malware has reached airport network too! The 'NewPosThings' malware has been found recently trying to control the hub of IP addresses associated with unnamed airports. A POS intrusion mainly happens when a card is swiped at any ecommerce transaction. Most POS systems are Windows-based which makes it simpler to create such malware to run on them.

data malware tech-news security