Share
The possibility that you download dangerous content is more present every day.
The wording of articles about the Internet security and the dangers that can be found on the other side of the digital path they do not seek to alarmbut they are the warning necessary for all of us to have watch out when we walk calmly through web pages, social networks or emails. Reality tells us that there are many dangers lurking on the other side, here we show you how to secure your smart home, and that we must be prepared and know your risks, so you can avoid them and browse safely.
Bad intentions reach SEO and are transformed into PDF documents
Recently, at the time of writing the article, we have known a report from the security company Netskope that tells us about the problems reported by the malware. It seems that recent times are being especially complicated in the downloads via phishingwith the use of SEOwhich are the actions used to raise positions in Google search results, to attract potential victims.
Internet security is compromised on a daily basis
In the last twelve months, the downloads via phishingi.e. tricking the victim into believing that they are downloading a file that turns out to be malicious, they have increased an 450%. Search optimization has allowed contaminated PDFs emerge in the top positions, both from Google like bing. In fact, the method is so evolved that downloads included the use of fake CAPTCHAsthose verification methods to know that you are human, which redirected to fake web pages.
Furthermore, it seems that the malware evolution does not stop and that has crossed virtual borders. Over the last twelve months, the majority of downloads have originated from the same region as the user, so we can understand that their fake domain extension is being rolled out globally. For example, him 84% of the american victims they downloaded malware of web pages hosted on USA. Netskopein his report, it states what:
Malware is no longer confined to traditional risk website categories. It lurks anywhere from cloud apps to search engines, leaving organizations at greater risk than ever. To avoid falling victim to these social engineering techniques and targeted attack methods, enterprise security leaders should regularly revisit their malware protection strategy and ensure entry points are controlled as much as possible.
Related topics: Security
Share