Please enable JavaScript.
Coggle requires JavaScript to display documents.
Mobile Device Vulnerabilities - Coggle Diagram
Mobile Device Vulnerabilities
Worm
A worm is computer code that spreads without user interaction. Most worms begin as email attachments that infect a computer when they're opened.
They spread over computer networks by exploiting operating system vulnerabilities.Payloads are pieces of code written to perform actions on affected computers beyond simply spreading the worm.
Consequences when it was infected
Freezing/crashing
Programs opening and running automatically
Slow computer performance
Firewall warnings
Emails sent to contacts without the user’s knowledge
Solution & Prevention
Avoid opening emails that you don’t recognize or expect, as many computer worms spread via email.
Refrain from opening attachments and clicking on links from untrusted/unfamiliar sources.
Keep the computers’ operating system and software up-to-date with vendor-issued security releases. These updates often contain security patches designed to protect computers from newly discovered worms.
Rootkit
The most common is phishing or another type of social engineering attack. Victims unknowingly download and install malware that hides within other processes running on their machines and give the hackers control of almost all aspects of the operating system.
A rootkit is a type of malware designed to give hackers access to and control over a target device. A rootkit is software used by cybercriminals to gain control over a target computer or network.
Consequences when it was infected
Blue screen
Unusual web browser behavior
Slow device performance
Windows settings change without permission
Web pages don’t function properly
Solution & Prevention
Keep up-to-date
Be alert to phishing scams
Use a comprehensive cyber security solution
Download files from trusted sources only
Be alert to your computer’s behavior or performance
Trojan Horse
Solution & Prevention
Keep all software systems up to date
Always keep a firewall enabled
Avoid clicking on web banners or unknown URLs
Be aware of phishing attacks and password-related risks
Trojan horses do not usually spread by themselves. They are spread by viruses, worms, or downloaded software.
A trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver.
Consequences when it was infected
Poor device performance: If a computer or mobile device is running slowly or crashing more frequently than usual, it may be a sign of undetected Trojan malware or other malicious programs.
Strange device behavior: This may involve executing programs without the user’s intervention. An increase in the number of spam messages and pop-ups on the gadget can also indicate a Trojan attack.
Botnets
Botnets are built to grow, automate, and speed up a hacker’s ability to carry out larger attacks.A bot herder leads a collective of hijacked devices with remote commands.Zombie computers, or bots, refer to each malware-infected user device that’s been taken over for use in the botnet.
Botnets are networks of hijacked computer devices used to carry out various scams and cyberattacks. The term “botnet” is formed from the word’s “robot” and “network.”
Consequences when it was infected
send spam
denial of service attack
misuse of resources
steal secrets information
Solution & Prevention
Update admin settings and passwords across all your devices.
Be wary of any email attachments.
Improve all user passwords for smart devices.
Never click links in any message you receive.
Avoid buying devices with weak security.
Install effective anti-virus software