• Home
  • About
    • Media Kit and Gift Guides
    • Privacy Policy
    • Affiliates & Ambassadors
  • Reviews
  • Giveaways
  • Recipes
  • Desserts
  • Crafts
  • Printables
  • Parenting
  • Movies
  • Pets

Mom Does Reviews

The Sweet Stuff of Life

Be the first to know about Recipes, crafts and more!

  • Fun Products
  • Home
  • Tech
    • App Reviews
  • Travel
  • Education
  • Finances
  • Health
  • Fitness
  • Beauty
    • Fashion
  • Weddings
  • Gardens

6 Cyber Threats Your Family Needs to Watch for

February 6, 2017 by Pam Maynard

The digital world is every bit as uncertain and chaotic as the physical world. Unfortunately, the threats in cyberspace aren’t always easy to identify and attack.

Despite ongoing improvements in cyber threat intelligence, individual technology users and small businesses alike face the same online threats. With proper precautions, some threats can be avoided altogether. Others can be mitigated, greatly reducing the risk that they’ll cause serious harm to users’ personal, financial or professional lives.

Let’s take a closer look at six common cyberthreats that often fly under the radar, and examine some simple tactics you can employ to fight back.

cyberthreats

  1. Phishing and Spear-Phishing

Phishing is the all-too-common practice of sending out malicious spam to hundreds or thousands of email addresses at a time. Phishing emails have a simple goal: to convince recipients to provide personal information, such as passwords or bank account numbers, that the originators can sell or exploit.

Spear-phishing is a more sophisticated version of the same practice. It usually targets a single organization or key individual, such as an executive, with uniquely valuable information.

The best way to prevent either type of attack is to keep your email system’s spam filters up to date and avoid opening, clicking links within or responding to dubious emails.

  1. Hackers on Public Wi-Fi Networks

If you routinely access the internet from unsecured public Wi-Fi networks such as those commonly found in hotel lobbies, coffee shops, and retail environments, your information could be at risk. Hackers can easily exploit unsecured Wi-Fi networks through attacks, wherein others may intercept and read communications coming from your computer—including potentially sensitive information such as passwords, account numbers and proprietary business data.

“The simplest and most cost-effective way to avoid hacker attacks is to avoid public Wi-Fi altogether. If that’s not possible, use a virtual private network, or VPN—a tool that effectively cloaks your computer’s location and encrypts its traffic,” says George Otte, Miami-based entrepreneur and founder of Geeks on Site.

  1. Password Attacks

Password attacks are basically automated attempts to guess your passwords. The weaker your password, the more likely the attacks are to succeed, so the best defense is a strong password that uses lots of random letter, number and special character combinations. Remember to change your passwords frequently and use different credentials for each account.

  1. Drive-By Downloading

Has your computer ever downloaded a file without your consent? You may have been the victim of drive-by downloading, an insidious practice wherein a website or link essentially forces your computer to download potentially malicious files. Drive-by downloading is a common means of installing malware on unsuspecting web users’ computers. The best protection is an up-to-date anti-malware system and a healthy suspicion of unsecured websites.

cyber safety_big

  1. Malicious Ads (Malvertising)

Malicious advertising has a similar end result: the installation of potentially harmful files or spyware on your computer. When in doubt, avoid clicking pop-up or text ad links, especially on sketchy websites. Use a pop-up blocker or ad blocker if possible. It’s not guaranteed that your anti-malware system will detect every instance of mal advertising, even if your program is up to date.

  1. Keystroke Logging Software

Keystroke logging software is one of several types of “silent” malware. Often delivered via trojan, it lurks in the background and quietly notes every single keystroke you make—including, potentially, passwords and account numbers. Make sure your anti-malware program has a secure keyboard input feature, and never input passwords on websites without valid SSL certificates.

If you’re looking for more information on common cyber threats, check out this excellent piece from Norton, an internationally acclaimed anti-malware developer.

Which of these potential threats has you most worried?

 

Tweet
Share
Pin
Share
0 Shares

Filed Under: technology Tagged With: cyber safety, cyber threats, keystroke logging software, malware, phishing

About Pam Maynard

Meet Pam, the heart and soul behind Mom Does Reviews! This busy wife, mom, and content creator shares her life from her happy homestead in New Hampshire. Her home is a bustling hub of love, shared with her son and three lively dogs. When she's not busy crafting engaging content, you can often find Pam enjoying quality time with her furry companions, indulging in her favorite chocolate, and savoring a good cup of coffee.



Contact Us

Are you ready for Spring?

Spring into Summer Gift Guide

Perfect Gifts for Mom, Dad & Grads!

Mom Dad Grad Gift Guide

ENTER OUR SWEET GIVEAWAYS!

$15 Amazon GC, WW
.
Moms Rock Giveaway Hop12 Days Left
Win $75 Amazon or PayPal Cash, US/CAN
.
Amazon 53112 Days Left
.

Blogger Giveaway Hop Signups

Don’t Forget your Valentine!

Sweet Valentine's Day Gift Guide

Have a Magical Merry Christmas!

Magical Merry Christmas Gift Guide #MegaChristmas24

Spectacular Stocking Stuffers!

Check out our Back-to-School Guide!

Back to School Gift Guide

Privacy Policy

Find our Privacy Policy here.

Copyright © 2026 · Magazine Pro Theme on Genesis Framework · WordPress · Log in