September 10, 2024
Massachusetts Law Again Covers Non-Competes
By Brooke Thomson President and CEO The use of non-compete agreements once again rests with Massachusetts law. That’s…
Read MoreIf you are not an AIM member - Consider joining. AIM Members receive access to all our premium content online.
If you're an AIM member please login to your AIM account to view this post:
By Webster Bank
Criminal perpetrators of malware attacks are displaying unprecedented relentlessness, intensifying their efforts to pilfer data, tarnish reputations, and wreak havoc across businesses of all scales. Understanding malware and knowing how to thwart attacks is the first line of defense for business leaders.
In 2023, the worldwide number of malware attacks reached 6.06 billion, an increase of 10 percent compared to the preceding year.
What Is Malware?
Malware is an intrusive software cybercriminals use to steal data or destroy computer systems. Oftentimes, the malware can be disseminated via phishing emails or downloads, or by accessing unsafe websites.
Types of Malware
From ransomware, adware, and spyware to viruses, worms, trojans, and cryptojacking, malware comes in myriad forms, with newer, more sophisticated forms emerging all the time. Here are a few common types to keep on your radar:
Adware
This software displays ads to the user by multiple pop-ups. Adware can track information about you or extract personal information. Adware can be bundled with other software or downloaded from non-reputable sources, like unofficial app stores.
Spyware
This runs silently and gives an attacker control over a device. Spyware can be installed when the attacker has physical access to your device and installs a spyware app, or if you get tricked into downloading the app via a fraudulent email or text message.
Trojan
When downloaded, Trojan software performs like the legitimate application but actually does malicious activity in the background. Trojans can be found in pirated or fake antivirus software.
Ransomware
When downloaded, this malware encrypts a company, organization, or individual’s data and holds the electronic key for ransom. Ransomware gained popularity recently and is now a primary objective for attackers globally. It usually attempts to spread itself at high speed through the network, locking every computer and server it can find.
Advanced Persistent Threat (APT) Attack
An APT attack is an attack from an intruder that establishes an undetected presence in a network to steal data over a prolonged period of time. APT attacks are often used simultaneously by fraudsters, who will attempt to maintain access to the system.