Search
Search titles only
By:
Search titles only
By:
Menu
Forums
New posts
Search forums
Home
What's new
New posts
Latest activity
Log in
Register
Search
Search titles only
By:
Search titles only
By:
Menu
Install the app
Install
Reply to thread
Home
Computers & Internet
Anti-Spyware - Anti-Virus - Cyberculture
Be CyberSmart about Attack Vectors
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Message
<blockquote data-quote="VIPRE Security" data-source="post: 413"><p>Most antivirus and cybersecurity solutions tell you that they protect your attack vectors. If you’re familiar with the industry, you know exactly what that means. However, most people aren’t cybersecurity professionals. So, they may want to know, “What are attack vectors?”</p><p></p><h3>Attack Vectors</h3><p></p><p>Attack vectors are the way cybercriminals try to attack you. Attack may be a bit broad. This means that they attempt to steal your information, <a href="https://www.vipre.com/is-this-link-a-scam/" target="_blank">scam</a> or defraud you, or in some rare instances <a href="https://www.washingtonpost.com/politics/2021/10/01/ransomware-attack-might-have-caused-another-death/" target="_blank">cause you physical harm</a>. These attack vectors don’t necessarily start with malware. Other paths and scenarios begin with social engineering. Criminals use a variety of attack vectors in case any of them are blocked. Spreading their malicious intent across different attempts allows them to ferret out weaknesses in your cybersecurity. VIPRE is going to help you become cyber smart about the most common attack vectors.</p><p></p><h3>Attack Vector – Email</h3><p></p><p>Email is one of the most attacked vectors, if not <a href="https://www.vipre.com/blog/email-security-how-to-secure-your-1-threat-vector/" target="_blank">the #1</a>. Cybercriminals can acquire lists of email addresses through the dark net, through guessing your address on LinkedIn, or even calling up your company and asking for it. This attack vector is relatively <a href="https://labs.vipre.com/buer-loader-found-in-an-unusual-email-attachment/" target="_blank">easy to exploit</a>. Now, there are plenty of security measures in place already. Most Email Service Providers do some filtering of spam and malicious emails. However, occasionally something will slip by. If it happens to a large enough company, that slip up can <a href="https://www.vipre.com/blog/disneys-latest-pirates-film-held-ransom-real-pirates/#email" target="_blank">become infamous</a>. Security products like <a href="https://www.vipre.com/products/home-protection/vipre-adv-security/" target="_blank">VIPRE Advanced Security</a> and <a href="https://www.vipre.com/products/business-protection/email-cloud/" target="_blank">VIPRE Email Cloud</a> provide email protection to secure this attack vector.</p><p></p><p>One of the truly insidious sides of this vector is how it can lull you into doing something risky. Cybercriminals will <a href="https://www.vipre.com/blog/unicef-college-scam-job-offers/" target="_blank">impersonate legitimate organizations</a>. They’ll also <a href="https://www.vipre.com/blog/hackers-target-veterans-seeking-jobs/" target="_blank">target vulnerable groups</a>. A final common tactic you need to be aware of is <a href="https://www.vipre.com/blog/phishing-during-covid-19/" target="_blank">exploiting people’s fears</a>. These examples all rely on an individual trusting the email’s source well enough to lower their defenses.</p><p></p><h3>Attack Vector – Apps</h3><p></p><p>Virtually all mainstream app stores utilize some level of security practices. Typically apps are scanned and vetted before becoming available for consumers. However, you still need to be careful. Security improvements are <a href="https://www.vipre.com/blog/android-security-safe-enough/" target="_blank">made year over year</a>. That just means hackers work harder to attack you in app stores like the <a href="https://www.vipre.com/blog/beware-downloading-apps-microsofts-windows-store/" target="_blank">Microsoft Windows’ Store</a>. The main gist of protecting yourself is to make sure an app has been on a store for some time and comes from a reputable publisher. This vector can be especially dangerous. You can override your security precautions when installing a malicious app.</p><p></p><h3>Attack Vector – Social Media</h3><p></p><p>Twitter can be an attack vector. In a famous example, celebrity accounts were used to swindle folks. Twitter hacks can also involve persuading someone to surrender posting permissions for their account. <a href="https://www.vipre.com/blog/facebook-copy-paste-quizzes-fun-folly/" target="_blank">Facebook</a> can also be used to harvest information from people. These are two of the most difficult attack vectors to secure because they rely on exploiting the perception of trust in order to attack you. This is why you have to be cyber smart. Don’t share information on Facebook and make sure you really know all of your friends.</p><p></p><h3>Attack Vector – Third Party Update/Supply Chain Vendor</h3><p></p><p>The most common third party update exploitation is hitting a piece of software that hasn’t been updated (Chrome, I’m looking at you). However, the most infamous third party attack was <a href="https://www.vipre.com/blog/fireeye-solarwinds-sunburst-hack-what-you-need-to-know/" target="_blank">with FireEye in late 2020</a>. The security company got hit by an update that was signed as securely coming from SolarWinds. However, it delivered a payload of malware. This situation was peculiar because it involved two giants of the security industry. However, the attack vector is not uncommon. That’s why it’s important to have multiple layers of security keeping your software up to date. VIPRE offers auto patch functionality for third party software <a href="https://success.vipre.com/advanced-security-home-windows-manage/home-windows-manage-patch-management?from_search=72651723" target="_blank">for personal</a> and <a href="https://success.vipre.com/endpoint-server-policies/endpoint-server-patch-management-settings?from_search=72651723" target="_blank">professional use</a>.</p><p></p><h3>#BeVIPRESecure</h3><p></p><p>There are more attack vectors out there, which is why you need to be VIPRE Secure. VIPRE is a proud <a href="https://staysafeonline.org/cybersecurity-awareness-month/champions/view-all/#:~:text=VIPRE" target="_blank">champion of cybersecurity month</a>. You can learn more about being <a href="https://www.vipre.com/cybersecurity-awareness-month-2021/" target="_blank">cyber secure here</a> or by visiting our friends at <a href="https://inspiredelearning.com/free-resources/cybersecurity-awareness-month-2021/" target="_blank">Inspired eLearning</a>.</p><p><img src="http://www.vipre.com/wp-content/uploads/2020/09/CAM_LOGO_full_color-296x300.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p>The post <a href="https://www.vipre.com/blog/be-cybersmart-about-attack-vectors/" target="_blank">Be CyberSmart about Attack Vectors</a> appeared first on <a href="https://www.vipre.com" target="_blank">VIPRE</a>.</p></blockquote><p></p>
[QUOTE="VIPRE Security, post: 413"] Most antivirus and cybersecurity solutions tell you that they protect your attack vectors. If you’re familiar with the industry, you know exactly what that means. However, most people aren’t cybersecurity professionals. So, they may want to know, “What are attack vectors?” [HEADING=2]Attack Vectors[/HEADING] Attack vectors are the way cybercriminals try to attack you. Attack may be a bit broad. This means that they attempt to steal your information, [URL='https://www.vipre.com/is-this-link-a-scam/']scam[/URL] or defraud you, or in some rare instances [URL='https://www.washingtonpost.com/politics/2021/10/01/ransomware-attack-might-have-caused-another-death/']cause you physical harm[/URL]. These attack vectors don’t necessarily start with malware. Other paths and scenarios begin with social engineering. Criminals use a variety of attack vectors in case any of them are blocked. Spreading their malicious intent across different attempts allows them to ferret out weaknesses in your cybersecurity. VIPRE is going to help you become cyber smart about the most common attack vectors. [HEADING=2]Attack Vector – Email[/HEADING] Email is one of the most attacked vectors, if not [URL='https://www.vipre.com/blog/email-security-how-to-secure-your-1-threat-vector/']the #1[/URL]. Cybercriminals can acquire lists of email addresses through the dark net, through guessing your address on LinkedIn, or even calling up your company and asking for it. This attack vector is relatively [URL='https://labs.vipre.com/buer-loader-found-in-an-unusual-email-attachment/']easy to exploit[/URL]. Now, there are plenty of security measures in place already. Most Email Service Providers do some filtering of spam and malicious emails. However, occasionally something will slip by. If it happens to a large enough company, that slip up can [URL='https://www.vipre.com/blog/disneys-latest-pirates-film-held-ransom-real-pirates/#email']become infamous[/URL]. Security products like [URL='https://www.vipre.com/products/home-protection/vipre-adv-security/']VIPRE Advanced Security[/URL] and [URL='https://www.vipre.com/products/business-protection/email-cloud/']VIPRE Email Cloud[/URL] provide email protection to secure this attack vector. One of the truly insidious sides of this vector is how it can lull you into doing something risky. Cybercriminals will [URL='https://www.vipre.com/blog/unicef-college-scam-job-offers/']impersonate legitimate organizations[/URL]. They’ll also [URL='https://www.vipre.com/blog/hackers-target-veterans-seeking-jobs/']target vulnerable groups[/URL]. A final common tactic you need to be aware of is [URL='https://www.vipre.com/blog/phishing-during-covid-19/']exploiting people’s fears[/URL]. These examples all rely on an individual trusting the email’s source well enough to lower their defenses. [HEADING=2]Attack Vector – Apps[/HEADING] Virtually all mainstream app stores utilize some level of security practices. Typically apps are scanned and vetted before becoming available for consumers. However, you still need to be careful. Security improvements are [URL='https://www.vipre.com/blog/android-security-safe-enough/']made year over year[/URL]. That just means hackers work harder to attack you in app stores like the [URL='https://www.vipre.com/blog/beware-downloading-apps-microsofts-windows-store/']Microsoft Windows’ Store[/URL]. The main gist of protecting yourself is to make sure an app has been on a store for some time and comes from a reputable publisher. This vector can be especially dangerous. You can override your security precautions when installing a malicious app. [HEADING=2]Attack Vector – Social Media[/HEADING] Twitter can be an attack vector. In a famous example, celebrity accounts were used to swindle folks. Twitter hacks can also involve persuading someone to surrender posting permissions for their account. [URL='https://www.vipre.com/blog/facebook-copy-paste-quizzes-fun-folly/']Facebook[/URL] can also be used to harvest information from people. These are two of the most difficult attack vectors to secure because they rely on exploiting the perception of trust in order to attack you. This is why you have to be cyber smart. Don’t share information on Facebook and make sure you really know all of your friends. [HEADING=2]Attack Vector – Third Party Update/Supply Chain Vendor[/HEADING] The most common third party update exploitation is hitting a piece of software that hasn’t been updated (Chrome, I’m looking at you). However, the most infamous third party attack was [URL='https://www.vipre.com/blog/fireeye-solarwinds-sunburst-hack-what-you-need-to-know/']with FireEye in late 2020[/URL]. The security company got hit by an update that was signed as securely coming from SolarWinds. However, it delivered a payload of malware. This situation was peculiar because it involved two giants of the security industry. However, the attack vector is not uncommon. That’s why it’s important to have multiple layers of security keeping your software up to date. VIPRE offers auto patch functionality for third party software [URL='https://success.vipre.com/advanced-security-home-windows-manage/home-windows-manage-patch-management?from_search=72651723']for personal[/URL] and [URL='https://success.vipre.com/endpoint-server-policies/endpoint-server-patch-management-settings?from_search=72651723']professional use[/URL]. [HEADING=2]#BeVIPRESecure[/HEADING] There are more attack vectors out there, which is why you need to be VIPRE Secure. VIPRE is a proud [URL='https://staysafeonline.org/cybersecurity-awareness-month/champions/view-all/#:~:text=VIPRE']champion of cybersecurity month[/URL]. You can learn more about being [URL='https://www.vipre.com/cybersecurity-awareness-month-2021/']cyber secure here[/URL] or by visiting our friends at [URL='https://inspiredelearning.com/free-resources/cybersecurity-awareness-month-2021/']Inspired eLearning[/URL]. [IMG]http://www.vipre.com/wp-content/uploads/2020/09/CAM_LOGO_full_color-296x300.png[/IMG] The post [URL='https://www.vipre.com/blog/be-cybersmart-about-attack-vectors/']Be CyberSmart about Attack Vectors[/URL] appeared first on [URL='https://www.vipre.com']VIPRE[/URL]. [/QUOTE]
Insert quotes…
Verification
Post reply
Home
Computers & Internet
Anti-Spyware - Anti-Virus - Cyberculture
Be CyberSmart about Attack Vectors
Top
Bottom
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…