is selective when choosing its customers<\/strong>, whom they interview before agreeing to rent or sell their service. <\/p>\n\n\n\nUnlike some attackers, who specialize in a certain type of device, DarkSide attacks are aimed at everyone, regardless of the operating system or the network type. Even though it\u2019s believed that Macs are less prone to ransomware than computers that run on Windows, viruses and malware can infect computers no matter the type. <\/p>\n\n\n\n
Social Engineering and Subtypes <\/h3>\n\n\n\n
Social engineering attacks work by tricking users into sharing their sensitive information. This can be done via phishing emails or even SMS messages and phone calls. <\/p>\n\n\n\n
Vishing & Smishing<\/h4>\n\n\n\n
Vishing is also known as voice phishing and works by extracting information from the victims through phone calls. It is usually done automatically.<\/strong> The attacker calls the victim and takes information from them while talking on the phone. Much like recent malware attacks and phishing attempts, the attacker talks to the victim, pretending to be someone from the bank. They can also record an automated voice message and call the victim, who thinks that they\u2019re following the bank\u2019s instructions. <\/p>\n\n\n\nOn the other hand, smishing works by sending fake SMS messages to a victim<\/strong>. There is typically a link on which the victim is supposed to click. They\u2019re often informed that if they do not sign in, their account will be suspended. Once they do this, all their data can be stolen. A quick peek at any malware database can reveal that these risks are spreading by the minute.<\/p>\n\n\n\nOnline Baiting <\/h4>\n\n\n\n
Similarly to vishing and smishing, online baiting has gained in popularity during 2022.<\/strong> Advertisements have become unavoidable in our lives, but some of them may be more than just a nuisance. <\/p>\n\n\n\nSome advertisements can infect your computer,<\/strong> and it\u2019s usually those that seem too good to be true. When you see an ad promising prize money or an unrealistic discount, make sure to stay away from it. <\/p>\n\n\n\nRomance Scams <\/h4>\n\n\n\n
As more and more people are using dating apps, cybercriminals have recognized this as a potential field for fraud. They typically pretend to be someone else,<\/strong> so they can seduce the user and eventually steal from them.<\/p>\n\n\n\nTypically, the cybercriminals aim to get to know the victim<\/strong> and later ask for money or tricking them into sharing their banking information.<\/strong> In cases like these, you don\u2019t need the most recent computer virus to pull off this scam – understanding human psychology will suffice. <\/p>\n\n\n\nPhishing <\/h4>\n\n\n\n
Phishing attempts are all too common<\/strong> nowadays. Black-hat hackers mainly send emails, creating a sense of urgency and trick users into giving out their sensitive information. This is usually done by prompting them to change their password because their account has allegedly been compromised or that they need to log in because they got paid. <\/p>\n\n\n\nIt is vital to always check the sender\u2019s address even when it appears legitimate.<\/strong> This can be done by taking a look at the properties of the email. Another useful strategy is always checking for spelling mistakes, and if there are any, someone is probably trying to hack your account. Still, keep in mind that the latest virus threats and phishing attempts are getting more subtle and refined. <\/strong><\/p>\n\n\n\nMajor Cyber Breaches and Cybersecurity Events of 2022<\/h2>\n\n\n\n
The year 2022 has already recorded some major cyber attacks. Some of them were aimed at corporations, while others involved governments. These attacks are to be expected,<\/strong> especially due to the ongoing war between Russia and Ukraine. <\/p>\n\n\n\nLapsus$ Launches Ransomware Attacks at Corporations <\/h3>\n\n\n\n
In March 2022, Lapsus$ successfully attacked<\/strong> several high-profile corporations, including T-Mobile, Nvidia, and Okta.<\/strong> Lapsus$ typically leaks information they acquire from victims. However, Okta issued a statement that vital information hadn\u2019t been stolen.<\/p>\n\n\n\nThe company continued by saying that it was due to a third-party contractor\u2019s vulnerability that the breach happened. Regrettably, this was not the first successful attack against Okta in the past four years, which goes to show that companies must be vigilant at all times.<\/p>\n\n\n\n
Conti Group\u2019s Chats Leaked <\/h3>\n\n\n\n
Some of the recent computer virus outbreaks were actually matched with a counterattack<\/strong>. For example, an enormous leak took place on February 28, when more than 60,000 messages sent by Conti group members were posted online.<\/strong> This hack offered a close look into how the Conti group, known for its ransomware attacks, operates. <\/p>\n\n\n\nIt is believed that this was an insider job<\/strong> and that a pro-Ukrainian Conti member decided to leak the chats because they were unhappy with the pro-Russian content on the Conti website. <\/p>\n\n\n\nRaidForums Seized by Authorities<\/h3>\n\n\n\n
Among the latest malware threats were those connected with RaidForums. Therefore, on February 25, 2022, US law enforcement and Europol took down RaidForums as part of Operation Tourniquet in a coordinated effort. This forum was mostly used as a marketplace for stolen data.<\/strong> Apart from dismantling the group, the forum owner was also arrested. What\u2019s almost unbelievable is that the 21-year-old owner of the RaidForums was only 14 when he founded it. <\/p>\n\n\n\nREvil Group Arrested by the Russian Government<\/h3>\n\n\n\n
According to Russian authorities, more than a dozen REvil members were arrested in 2022.<\/strong> Although this action left a mark on cybercriminals, it\u2019s unlikely to have a lasting effect in terms of suppressing this criminal activity – in Russia or worldwide. \u200b\u200bThere are a multitude of current virus threats perpetuated by many malicious groups and they are difficult to deal with as they are cropping up everywhere. <\/p>\n\n\n\nShields Up Introduced for Protection Against Russian Cyberattacks<\/h3>\n\n\n\n
With the war in Ukraine and cyberattacks aimed at vital Ukrainian agencies, US authorities decided to introduce the Shields Up<\/strong> protection system as protection against possible Russian cyberattacks. <\/p>\n\n\n\nHow To Protect Yourself <\/h2>\n\n\n\n
Learning to recognize a threat is one of the most important things when it comes to online security. That\u2019s why it\u2019s vital that we take cybersecurity seriously and stay up to date with the latest developments. However, this is often not enough.<\/p>\n\n\n\n
It is necessary to invest in a reliable antivirus<\/strong> that will be able to block all incoming virus threats but that will also be capable of fixing the damage if it comes to that. If you\u2019re a business owner, using a strong endpoint security platform is highly recommended because a simple legacy antivirus might not cut it. <\/p>\n\n\n\nAntivirus Protection: Top Three Recommendations<\/h2>\n\n\n\n
If you want to be certain that your devices are secure, the best way to protect yourself is to invest in a good antivirus. The ones we\u2019ll discuss below are excellent choices.<\/p>\n\n\n\n
Avast Antivirus<\/h3>\n\n\n\n
With more than 430 million users, Avast is still one of the cybersecurity leaders. Avast offers an antivirus scanner and ransomware protection. This makes it useful against the latest virus threats we\u2019ve listed in this article. <\/p>\n\n\n\n
The interface is easy to use, and premium users can reach customer support via chat, email, or phone. The company, which offers a paid and free plan, proudly claims that it can stop 66 million threats a day. <\/p>\n\n\n\n
Bitdefender <\/h3>\n\n\n\n
Bitdefender has plans for both home and business, offering all the features needed to keep your devices safe. This antivirus is equipped with advanced ransomware protection, password manager, webcam and microphone protection, system optimization, and many other useful features, such as anti-phishing and web protection. <\/p>\n\n\n\n
Malwarebytes <\/h3>\n\n\n\n
This strong antivirus is available for both mobile and computers. You can use it on Windows, macOS, iOS, Android, and Chromebook to help you deal with any current virus threat. <\/p>\n\n\n\n
Its interface is simple and easy to use, and if you\u2019re using it on your mobile, there\u2019s Malwarebytes Privacy VPN.<\/p>\n\n\n\n
Just like the previous picks, Malwarebytes will protect you from most of the current threats, and you can choose from four different scans. These are threat scan, quick scan, custom scan, and single file\/folder scan. <\/p>\n\n\n\n
Conclusion <\/h2>\n\n\n\n
The year 2022 has been quite productive for online criminals, and even with the constant battle of the authorities, their number does not seem to have diminished. Worse still, attacks aimed at businesses have increased, and some of the new threats are extremely hard to avoid.<\/p>\n\n\n\n
Individuals and businesses alike need to invest in anti-malware solutions. Sadly, personal, financial, and corporate data have become a currency of sorts.<\/strong> As the latest virus threats can affect anyone, we should all remember that even the least important piece of information we possess is priceless. <\/p>\n","protected":false},"excerpt":{"rendered":" […]<\/p>\n","protected":false},"author":20,"featured_media":566,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[3],"tags":[],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/New-Computer-Virus-Threats-in-2023.png",1280,720,false],"thumbnail":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/New-Computer-Virus-Threats-in-2023-150x150.png",150,150,true],"medium":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/New-Computer-Virus-Threats-in-2023-300x169.png",300,169,true],"medium_large":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/New-Computer-Virus-Threats-in-2023-768x432.png",768,432,true],"large":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/New-Computer-Virus-Threats-in-2023-1024x576.png",1024,576,true],"1536x1536":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/New-Computer-Virus-Threats-in-2023.png",1280,720,false],"2048x2048":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/New-Computer-Virus-Threats-in-2023.png",1280,720,false]},"uagb_author_info":{"display_name":"Nikolina Cveticanin","author_link":"https:\/\/dataprot.net\/author\/nikolina-cveticanin\/"},"uagb_comment_info":0,"uagb_excerpt":"[…]","_links":{"self":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts\/565"}],"collection":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/comments?post=565"}],"version-history":[{"count":2,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts\/565\/revisions"}],"predecessor-version":[{"id":2752,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts\/565\/revisions\/2752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/media\/566"}],"wp:attachment":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/media?parent=565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/categories?post=565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/tags?post=565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}