1/
Ten Malware Myths - A Thread

Several years ago, #CyberSecurity firm G Data conducted a large scale survey to determine how well internet users understood the dangers online. The following ten myths are drawn from the results of that survey.
2/
Myth 1 - If I don't notice anything suspicious my device is not infected.

Apart from #Ransomware that loves to make a splash, the longer malware can go undetected, the more useful it can be to a criminal who can continue to use it.
3/
Think Zombie (botnet) - such a device can send spam, assist in espionage or participate in a #DDoS attack
4/
Myth 2 - Free #antivirus is adequate

We can all remember earlier this year when a certain free antivirus company was selling its users browsing data. Just think about it, for free products, there is also a paid counterpart.
5/
Why would antivirus makers do this if the free version provided equally good protection?
6/
Myth 3 - #Malware is mostly sent via email attachments

While email is still a very potent delivery method, social networking sites have become a favorite for cybercriminals. We've all witnessed WhatsApp chain messages with links to sites ready to serve malware.
7/
We'll stop here for today. Join us tomorrow for more myths. But more importantly, register for our webinar where we'll be discussing in-depth issues related to the use of malware and social engineering.

Register for free at http://bit.ly/HoodOffChat6 

#NoGoFallMaga #HoodOffChat
8/
Myth 4 - Surfing the web is safe as long as I don't download anything

Cybercriminals do not abide by the #GDPR, hence don't expect them to ask for your permission before loading your device with malware.
9/
Visiting a compromised site is all it takes for your device to get infected (usually the malware program is very small) without you taking any other action. This method of
delivering malware is known as drive-by-download
10/
Myth 5 - It's easier to get infected through Torrent sites

Yes, malware authors love to pass off trojans as the current version of a paid software and put them on
P2P networks. Still, the infection rate is lower when compared to other methods such as drive-by-
downloads
11/
Myth 6 - "I am safe because I don't visit adult sites"

With an estimated 28,000 users viewing pornographic material every second, it's a no-brainer that malware authors use sites hosting erotic content to spread malware.
12/
But the fact remains that safety depends on the competency of a site's administrator(s) and the sophistication of the attackers rather than on the nature of a site. Any site can be a potential vector for the spread of malware.
13/
Myth 7 - If I don't open an infected file I am safe

Yeah, back in the good old days! These days user interaction isn't always required as it has become
possible to write malware that both the download and execution go unnoticed.

To be continued.....
14/
If you want to find our more about malware register for our free webinar at http://bit.ly/HoodOffChat6 

#NoGoFallMaga #HoodOffchat @DeloitteNigeria @secycone @0x @marshalwahlexyz
You can follow @nogofallmaga.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: