Infected computers

So many times I hear people around me saying “hey, my computer is
infected, but it’s okay, I can still do my things.” You can still do
your things, but who knows who else is doing *their thing*, intercepting
your browsing sessions or logging every key that you press. That includes, all of
your activity on social networks such as Twitter, leading to easy account
hijacking scenarios.

So many times I hear people around me saying “hey, my computer is
infected, but it’s okay, I can still do my things.” You can still do
your things, but who knows who else is doing *their thing*, intercepting
your browsing sessions or logging every key that you press. That includes, all of
your activity on social networks such as Twitter, leading to easy account
hijacking scenarios.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.