Internet Security Threats? In Detail Page 2

In this post we are going to look at more Internet Security Threats we may encounter while online. We are going to look at Threats H Through Z and find out, What they are? and What they do?

So let’s get right into

Internet Security Threats H – Z

H Threats

  • Hacker – Term used to describe an individual
    who uses their computer skill and knowledge to “Hack” into computers,
    networks and systems to conduct criminal online activities.
  • Hacktivist – is an individual or group that
    most commonly has a social or political agenda it wants to promote, so
    they try to gain unauthorized access “Hack” into networks, computers and
    or systems. Hacktivists more often than not engage in some type of
    Cyber-Terrorism. The term is a hybrid of the words “HACKer” and “acTIVIST


I Threats

  • Internet Relay Chat (IRC) – Are some of the
    first generations of Botnets used for criminal intentions. These Botnets
    are easy to make and manage but are very easy to identify and shutdown.
    The servers used and the Botmaster are also easy to identify.

IRC Botnets are making a comeback due to certain advancements and
with the use of multiple C&C servers which allows Cyber-Criminals to
use an IRC Botnet with a smaller risk of being identified and shut

K Threats

  • Keyloggers – Software designed to allow Bots to
    collect information associated with specific Keyboard strokes. If, the
    Keylogger is running this software on multiple computers over the Botnet
    system it doesn’t take long for a Cyber-Criminal to gather sensitive
    data and information.

M Threats

  • Macro – Virus written in Macro language launch through an or Microsoft Word file attachment.
  • Malware – Designed solely to cause harm to
    networks, systems, data, computers, and devices. Uses various malicious
    tools such as AdWare, Spyware, Viruses, Worms, Ransomware, Scareware,
    etc. The term is a hybrid of the word “MALicios” and “softWARE
  • Malvertising – Uses online advertising to
    distribute and spread Malware. This type of attack is launched by
    inserting Malicious advertisements onto legitimate advertising networks
    and web sites. The malicious Malware is spread very easily because they
    appear on legitimate sites and people are tricked into believing it is

The term is a hybrid of the words “MALware” and “adVERTISING

  • Man-In-The-Middle (MITM) – An attack launched
    by a Cyber-Criminal who puts himself between two parties in a
    communication, with the intention of impersonating one or both parties
    in order to gain unauthorized access or to intercept confidential or
    sensitive data. Such as passwords, documents and or bank account, credit
    card information.


P Threats

  • Packer – Compressed malicious software that when launched “Un Packs” itself in computer memory.
  • Payload – The actual part of a malicious program that is designed to cause damage or perform a malicious action.
  • Phishing – Attack carried out to try to trick a person or persons into divulging their personal information which the “Phisher” can use to make money. Phishing is a very popular type of scam, Cyber-Criminals will send out Emails and or Advertising en mass.Phishing

These Emails and Advertising give the appearance of originating from legitimate sources with the sole purpose to steal your information. The type of information they are trying to access is passwords, user names, credit cards, and banking information.

  • Protector – Element that is hidden in Malware that acts as an Encryptor and Packer which helps to prevent the tampering or re-engineering of the Malware.
  • Peer-To-Peer Botnet (P2P) -The P2P Botnet uses a decentralized network of Bots for added security and protection from discovery and the shut down of these Botnets. P2P Botnets can operate with or without C&C servers and are made to randomly obfuscate the Botnets and its function.

R Threats

  • RootKit – A Malicious software attack that allows access to otherwise inaccessible parts of the computer such as systems and or software. This Malware will most often contain Root Kits that allow modification to the operating system. This modification allows the Malware to be concealed from the user.

  • Ransomware – Type of attack that blocks or limits authorized user access to computers, devices or entire network systems until a “Ransom” is paid to the perpetrators of the attack.

S Threats

  • Sniffing – Bot that can be used to spy on or “Sniff” for specific data and or text entering an infected computer or device such as passwords, usernames, etc.
  • Snowshoeing – Type of Spam messaging attack using multiple Domains and IP Addresses to send junk or Spam Emails to recipients. In most cases, these attacks are structured in a way that the IP Addresses send out low volumes of messages to by-pass and prevent blocking from Spam Filtering programs.
  • SpyWare – Malicious software that Spies on computer and device users. This type of software is designed to Spy on Emails, files, documents and can also be used to capture keystrokes. They can also be used to turn on webcams and video cameras.
  • Spear Phishing – Phishing attack targeting a specific person or persons. These types of attacks are commonly launched against government officials, executives, and celebrities or other high profile individuals.
  • Social Engineering – Term most often used to describe a Cyber-Criminal involved in the psychological manipulation of an intended target and to get them to act in a manner they normally would not. Such as divulging personal or sensitive information or to open or “Click” on a malicious document or link.
  • Steganography – Is a technique used to obfuscate a video, file, message, or image in another video, file, message or image. These malicious files’ are indistinguishable from the real files’ and can be stored on infected websites or legitimate image sharing platforms. The downloaded malicious files’ are almost completely hidden in normal internet browsing traffic.

T Threats

  • Threat Vector – The delivery method used to send any type of threat to the intended target.
  • Trojan – Malicious non-replicating software that contains a hidden function of some sort.
  • TOR-Based-Botnets – TOR itself is an anonymous internet platform that allows the user to send and receive encrypted data and information through a series of interconnected servers along the TOR network. TOR provides anonymity by hiding the users’ true location.

Some Cyber-Criminals have started to use TOR to hide their C&C servers which also operate with a common IRC protocol.

V Threats

  • Virus – Malicious software used to infect a network, system or computer that is designed to harm, alter, or damage data or a program on the system.
  • Vulnerability – Flaw or weakness in the network, software or system. These are used by Cyber-Criminals to gain unauthorized access or “Hack” into the system. They can also be the focus of a constant targeted attack.
  • Vishing – Attack that uses Social Engineering via phone calls. This type of attack uses automated phone messages to obtain sensitive personal information from its intended victims. The term “Vishing” is a hybrid of the words “Voice” and “PhISHING“.

W Threatsmalware protection

  • Worms – Malicious software that is designed to self replicate itself through a computer network and eventually will infect all the computers within the network.
  • Watering Hole – Attack which infects websites frequented by the targeted person, persons or organization. The idea is to infect these websites with malware with the goal of eventually infecting the intended target.
  • Whaling – Attack commonly targeting high profile individuals. This type of attack is carried out with the use of Emails being sent requesting the targeted recipient to perform some type of task. It could be to send a wire, respond to a complaint or a legal request. The email could also contain a malicious link.

Z Threats

  • Zombie – Alternate term used to describe a Bot, since the Bot is under the control of a person or device. Conversely, a Botnet is referred to as a “Zombie Army”.
  • Zero-Day-Attack – A Cyber-Criminal will leverage an otherwise unknown vulnerability in a system, network or software with criminal intent. These attacks are usually launched against software developers, Cyber-Security professionals, and the general public.

We Are Done!!!

As mentioned at the beginning of this post we were going to look at Internet Security Threats H through Z,  So I hope you found the Second part of the glossary of Internet Security Threats informative. We covered most known threats we face, I hope that you have found these two posts informational and help to shine a light on the evergrowing number of threats that Cyber-Criminals use to seal our information.

I hope you enjoyed this post and if you have any questions or just want to leave a comment please do so below

Take care

Stay secure and always practice

Safe Text !!!


10 thoughts on “Internet Security Threats? In Detail Page 2

  1. Internet threats are far what everyone should pray never to fall a victim to in life …. But you will understand my point more when you lose money to hackers online or probably files you never wanted a second party to have access to. It’s important that from time to time we must take proactive measures to prevent our internet source against hackers

    • Hi, Evans, Thank you for taking the time to visit and for your comment. I am glad you found the post both helpful and informative.

      Take care
      Stay secure and always practice
      Safe Text !!!

  2. Brilliant article again.

    I had never heard of the term Hacktivist before and I have to admit it made me smile. It’s such a simple yet grossly active description of a cyber terrorist. 

    Of course the threats you are discussing can be very serious, so I shouldn’t really be smiling. Ransomware is obviously the most common term we have all heard through movies etc and I think a lot of us incorrectly assume the danger isn’t real. It won’t happen to us!

    With covid-19 at the moment , we all should be aware how dangerous a virus can be.  The truth is a computer virus can be almost as serious. It can destroy a business or an individual.

    As I said Brilliant article.  You have taught me quite a bit that I didn’t’ know before

    • Hi, Lawrence, Thank you for taking the time to visit and for your comment. I am glad you found the post both helpful and informative. Yes, I agree some of these viruses can do irreparable damage.

      Take care
      Stay secure and always practice
      Safe Text !!!

  3. Hi there. With the internet security problem growing larger everyday, it is important to know the different kinds of threats out there. I have experienced many hackers on social media accounts and viruses from certain websites. I look forward tp reading more about how a VPN can help. Thanks for sharing this post and keep it up!

    • Hi, Rashaad, Thank you for taking the time to visit and for your comment. I am glad you found the post both helpful and informative.

      Take care
      Stay secure and always practice
      Safe Text !!!

  4. I read all part 1 and forward it to some friends and co-workers. But now I noted that there is also part 2. This section, I found even more interesting: I didn’t know that bots were referred to as zombies and that a net of bots were a “zombie army”. Quite creative term but the consequences these threats present are nothing to play with.

    Thanks again for this nice glossary.

    • Hi, Ann, Thank you for taking the time to visit and for your comment. I am glad you found the post both helpful and informative. I agree some of these threats are very dangerous !!

      Take care
      Stay secure and always practice
      Safe Text !!!

  5. Hi ! its very timely that you share this article to your readers because a month ago my wife was a victim of this hacker/s…her credit card details was hacked including her pin number and the charges appeared in the bank billing statement every month for almost 3 months.We started to noticed that because our billing statement started to increased every month so we had our initial investigation  and found out that there are anonymous transactions was noted,then we went to the bank that issued the credit card and filed a complaint with a dispute letter and the credit card was suspended and change to a new one,then the extra charge (almost 1000 USD ) that was paid by us and incurred by the hacker was given back to us. It  is a form of phishing as explained by the bank official. So now I understand what phishing is because we are once a victim of that. Thank you for that interesting article you published mi amigo!…it help a lot!

    • Hi, Laertes, Thank you for taking the time to visit and for your comment. I am glad you found the post both helpful and informative. I am glad you got it all sorted out, a few years back I was in a similar situation so I know what you and your wife went through.

      Take care
      Stay secure and always practice
      Safe Text !!!

Leave a Comment