• Contact
Friday, May 23, 2025
Pledge Times
  • World
    • World Europe
  • Business
  • Tech
  • Entertainment
  • Lifestyle
  • Sports
  • Gaming
  • Health
  • World
    • World Europe
  • Business
  • Tech
  • Entertainment
  • Lifestyle
  • Sports
  • Gaming
  • Health
No Result
View All Result
Pledge Times
No Result
View All Result
Home Tech

The viruses that sneak into the ads to threaten the data

by admin_l6ma5gus
January 24, 2025
in Tech
0
The viruses that sneak into the ads to threaten the data
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

Legitimate pages and incredible offers are some traps of cybercriminals to invade user privacy and profitability from it. Each time computer viruses are better updated, which leads companies to invest a large amount of money in cybersecurity.

Visit a safe website to learn to cook chicken to the chicken and save a striking announcement of that laptop that you longed for a long time, but with an incredible price. This must awaken the alerts, since it can be Malvertishingone of the most common techniques so that The user ends up clicking on the link of the Offer and sailing for insecure websiteswhere your data is in danger. Privacy, in this case, is affected. The secret of this trick lies in appear on legitimate pages. Another of the very common traps is the ADWAREwhose hook is also advertising.

But what do these terms really mean? Are they the same? The answer is negative. The main difference is that the Malvertishing appears on websites that are trustworthy. In this case, the user is aware of the page he visits, but not what he means to prick the announcement for the confidence that the website offers. For its part, in the ADWAREthe Internet user is not aware that this virus has been installed. This usually occurs when downloading a software.

According to the INCIBE (National Cybersecurity Institute), the modus operandi of the ADWARE is Collect personal information to prepare a cyberbasin according to their tastes and show advertisements “according to the interests of the user”. As a consequence, The virus accesses sensitive data that “they can end in the hands of third parties without consent” and without knowing it. The next phase is to fill the computer screen with a multitude of notifications and ads that hinder the use of the device. The objective of ADWARE is to get the maximum number Clicks possible.

In addition to Malvertishing and of ADWARE exist Other very common viruses. Eva López Granero, head of communication in cybersecurity for society of S2 Group highlights five. One of the best known is the stenography that “hides malicious code in images or texts.” Another uses the photographs to deceive, it is about the Polyglot images that “seem normal, but they contain malware And, in addition, they execute it, “says López.

A virus also common is the Scareware, A hybrid between fear and technology, since it is “false ads that indicate that the device is infected and generates fear fear.” Following the same line, there are Spots They promote updates of software fraudulent. For its part, the technical support scams They consist in “making believe that the device is infected and give a false support of support to solve it.”

How to avoid ‘malware’?

Although there is greater awareness of the presence of computer viruses, they are updated thoroughly and constantly, so sometimes, sometimes, The skepticism and distrust of the user are not enough. Therefore, it is important to follow the advice of experts.

López exposes that the first thing is “Be aware that there are these threats to be attentive”. Something that can make it difficult because “we have to go in terms of matters of awareness in cybersecurity.” From there, the head of communication in cybersecurity for society of S2 Grupo recommends Download advertisement blockers in browsers that are used on a day -to -day basisin addition to “having a Antivirus on our computer and keep it updated. “

Deactivate the navigator accessories that we do not use, keep updated our devices and download the software “Only from official pages” They are three appropriate practices to avoid deception, suggests the professional.

After having been the victim of a computer virus, the head of communication in cybersecurity for society indicates, as a prevention measure, “review, update and securize your devices, in addition to changing passwords.” However, everything will depend on what happened and what the final damage has been. If it is economic subtraction it is convenient to inform your bank and “review charges and possible problems.” However, in case of complications, denounce To get your amparo.

These types of arguments affect both individuals and companies. Although for companies the biggest cybersecurity challenge “is not this type of malware,” says López and acknowledges that “the door to new problems such as the ransomwarewhich has been one of the Greater concerns in 2024 and that it is expected to continue being a real headache by 2025 “.

According to the incibe, In 2024 more than 120,000 incidents related to ransomware and this figure is expected to continue increasing. This type of malware It infiltrates mobile devices and equipment connected to the Internet, blocking access to information. His modus operandi It is encrypting it and Request a rescue “To be accessible or not disseminated again,” the institute details.

He ransomware It is not a new concept, but its impact and sophistication continue to grow. “In 2025, ransomware attacks are expected to be more directed and personalizedwith the aim of maximizing profits for attackers, “says Víctor Ronco, CEO of Zerod. And adds that cybercriminals in addition to encrypting data,” also threaten to publish them, increasing the pressure on victims. “

The cost of cyber threats is not only measured in financial losses, but also in damage to reputation, operational interruptions and possible regulatory sanctions. According to recent studies, The global cybercrime cost could reach 10.5 billion dollars in 2025.

#viruses #sneak #ads #threaten #data

Tags: adsdatasneaktechnologythreatenviruses
admin_l6ma5gus

admin_l6ma5gus

Next Post
Controversy for the cleanliness of plillas: they denounce that the government favors the interference of tobaccoleras in public policies

Controversy for the cleanliness of plillas: they denounce that the government favors the interference of tobaccoleras in public policies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

The Catalan Mario Lanza creates an electronic memory that can transform the AI

The Catalan Mario Lanza creates an electronic memory that can transform the AI

1 month ago
The Barcelona costumes, critic after the tie: “In the League it happened to us … you have to learn from this”

The Barcelona costumes, critic after the tie: “In the League it happened to us … you have to learn from this”

3 months ago

Popular News

  • The investor returns to buy bonds with the last note in the commercial war

    The investor returns to buy bonds with the last note in the commercial war

    0 shares
    Share 0 Tweet 0
  • A 29 -year -old Italian tourist in the center of Valencia

    0 shares
    Share 0 Tweet 0
  • Where can you take the best Gilda with Vermut Turmeon in Zaragoza?

    0 shares
    Share 0 Tweet 0
  • Several injuries to the knife attack in Hamburg

    0 shares
    Share 0 Tweet 0
  • Young Manuel Castellano dies, a ‘crazy’ of Betis who had everything ready for Breslavia

    0 shares
    Share 0 Tweet 0

For Ads: [email protected]

  • Contact

No Result
View All Result
  • World
  • Business
  • Science
  • Entertainment
  • Gaming
  • Sports
  • Fashion
  • Lifestyle
  • Tech
  • Health