cipher.com Open in urlscan Pro
2606:4700:3108::ac42:2b17  Public Scan

URL: https://cipher.com/blog/4-ways-to-get-a-virus/
Submission: On December 01 via manual from IN — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://cipher.com/

<form role="search" method="get" class="et_pb_menu__search-form" action="https://cipher.com/">
  <input type="search" class="et_pb_menu__search-input" placeholder="Search …" name="s" title="Search for:">
</form>

POST https://cipher.com/wp-comments-post.php?wpe-comment-post=cipherdivi

<form action="https://cipher.com/wp-comments-post.php?wpe-comment-post=cipherdivi" method="post" id="commentform" class="comment-form">
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message" aria-hidden="true">Required fields are marked <span class="required" aria-hidden="true">*</span></span></p>
  <p class="comment-form-comment"><label for="comment" style="display: none;">Comment <span class="required" aria-hidden="true">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525"
      required="required"></textarea></p>
  <p class="comment-form-author"><label for="author" style="display: none;">Name <span class="required" aria-hidden="true">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"></p>
  <p class="comment-form-email"><label for="email" style="display: none;">Email <span class="required" aria-hidden="true">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes"
      required="required"></p>
  <p class="comment-form-url"><label for="url" style="display: none;">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="form-submit"><button name="submit" type="submit" id="et_pb_submit" class="submit et_pb_button">Submit Comment</button> <input type="hidden" name="comment_post_ID" value="2585" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
  <p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="28407dab0e"></p>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1669907278128"></p>
</form>

Text Content

Blog    Free Trial  
 * CIPHERSOLUTIONS
   * security  Managed Detection and Response (MDR)
   * beenhere  Managed Security Services (MSS)
   * record_voice_over  Cyber Intelligence Services (CIS)
   * local_police  Red Team Services (RTS)
     * local_police  Red Team Services (RTS)
     * policy  Penetration Testing
   * assignment_turned_in  Governance, Risk and Compliance (GRC)
     * assignment_turned_in  Governance Risk & Compliance Overview (GRC)
     * assignment_ind  General Data Protection Regulation (GDPR)
     * payment  Payment Card Industry Data Security Standard (PCI DSS)
   *   Cyber Technology Integration (CTI)
   *   Incident Response Team (IRT)
   
   * --------------------------------------------------------------------------------
   
   *   Cybersecurity for Internet of Things (IoT)
 * CIPHERLABS
 * INDUSTRIES
   *     Financial Services
   *    Manufacturing
   *     Healthcare
   *     Logistics
   * casino     Gaming
   *      Energy and Utilities
 * INSIGHTS
   * Blog
   * Podcast
   * Events
   * Resources
 * COMPANY
   * About Cipher
   * About Prosegur
   * Why Cipher
   * Work With Us
 * CONTACT US
 *    Choose Language
   * EN
   * PT
   * ES

 * CIPHERSOLUTIONS
   * security  Managed Detection and Response (MDR)
   * beenhere  Managed Security Services (MSS)
   * record_voice_over  Cyber Intelligence Services (CIS)
   * local_police  Red Team Services (RTS)
     * local_police  Red Team Services (RTS)
     * policy  Penetration Testing
   * assignment_turned_in  Governance, Risk and Compliance (GRC)
     * assignment_turned_in  Governance Risk & Compliance Overview (GRC)
     * assignment_ind  General Data Protection Regulation (GDPR)
     * payment  Payment Card Industry Data Security Standard (PCI DSS)
   *   Cyber Technology Integration (CTI)
   *   Incident Response Team (IRT)
   
   * --------------------------------------------------------------------------------
   
   *   Cybersecurity for Internet of Things (IoT)
 * CIPHERLABS
 * INDUSTRIES
   *     Financial Services
   *    Manufacturing
   *     Healthcare
   *     Logistics
   * casino     Gaming
   *      Energy and Utilities
 * INSIGHTS
   * Blog
   * Podcast
   * Events
   * Resources
 * COMPANY
   * About Cipher
   * About Prosegur
   * Why Cipher
   * Work With Us
 * CONTACT US
 *    Choose Language
   * EN
   * PT
   * ES




INSIGHTS > BLOG

Blog    Podcast  Events  Resources  


4 WAYS TO GET A VIRUS

Having your computer infected with malicious code is a difficult experience.
Stop viruses and malware in the first place by using CipherBox MDR. The person
whose device gets infected is not wholly innocent however. Unless the virus is
on a device beforehand, there are typically four types of actions that can
result in malware getting on a computer. Understand what they are and avoid
them.


1. TORRENTS



Downloading torrents is a quick way to get a virus. Downloading a torrent file
also exposes your IP address to the public if you are not using a VPN or other
method. That sharing, which makes the torrent process possible, is the same
thing that makes your system vulnerable.

Illegally-activated programs can be downloaded on such sites. The people who
cracked the program are the same people who can install malware onto the file.
An estimate from several years back estimated that 1/3 of user visiting
torrent-related sites get infected. Techniques exist that make downloading
torrents safer. But when it comes to cybersecurity, stay away.


2. ADULT WEBSITES

Visiting adult websites can lead to having your computer compromised. Much like
Torrent sites, websites with adult material can serve malware-infecting content.
The content can be in the form of material downloaded or served up by just
visiting in the form of “malvertising”. Malvertising infects users computers by
showing in the browser. Organization policies likely forbid visiting adult
websites on company computers. This method of acquiring a virus makes the user
especially guilty.


3. THUMBDRIVES



Picking up a thumbdrive laying around can be a convenient solution to
transferring a file. But that convenience comes at the cost of risking malware
from coming to the computer it’s plugged into. The virus can spread from
computer-to-computer any time a USB is plugged in. There are ways to make USBs
more secure with passwords and encryption, but transferring files in a secure
digital-only format is more secure.


4. PHISHING

Getting a virus from a phishing attack is another possibility. Phishing attacks
can succeed on even a sophisticated user. The emails are disguised to fool the
user into taking an action like clicking a link that installs malware. The email
might imitate a person in your company or look like it’s coming from an
organization that someone is familiar with. There are methods to detect phishing
like paying close attention to the email address it is coming from and the link
URL. For a complete list of tips to avoid phishing, download this guide to
preventing phishing.

DID YOU ENJOY THIS BLOG ARTICLE? COMMENT BELOW WITH YOUR FEEDBACK.


0 COMMENTS




SUBMIT A COMMENT CANCEL REPLY

Your email address will not be published. Required fields are marked *

Comment *

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.

Submit Comment



Δ


GET EMAIL UPDATES





INFORMATION SECURITY MATURITY SELF-ASSESSMENT SURVEY





LEARN MORE

•  Whitepapers
•  E-books
•  Checklists
•  Self-Assessments
•  Webcasts
•  Infographics





SOCIAL MEDIA


LINKEDIN


POWERED BY JUICER

19mo

Attackers added malicious code to a popular development tool. The code sent AWS
credentials to their server. #cybersecurity https://bit.ly/2QyxE3U




VIEW ON LINKEDIN



SOCIAL MEDIA


TWITTER

JOIN US NOV. 15TH FOR OUR WEBINAR, "HEALTHCARE CORP VS. MALWARE ATTACKS," WHERE
WE WILL DISCUSS A CASE STUDY OF OUR WORK IN THE HEALTHCARE INFORMATION SECTOR.
...WE'LL DIVE DEEP INTO HOW YOU CAN PROTECT YOUR BUSINESS AGAINST MALWARE
SPANNING ALL INDUSTRIES.

HTTPS://BIT.LY/3WUWFCX





SOCIAL MEDIA


FACEBOOK

FOTO DA CAPA DE CIPHER - A PROSEGUR COMPANY ... SEE MORESEE LESS
VER NO FACEBOOK
· SHARE

SHARE ON FACEBOOK SHARE ON TWITTER SHARE ON LINKED IN SHARE BY EMAIL





INSIGHTS


WHITEPAPER


DIG INTO THE DETAILS OF CYBERSECURITY AND REGULATIONS BY READING OUR EXCLUSIVE
WHITE PAPERS. EACH PAPER IS WRITTEN BY AN EXPERT AT CIPHER AND FULL OF INSIGHT
AND ADVICE.

LEARN MORE

CIPHER SOLUTIONS
 * Managed Detection and Response (MDR)
 * Managed Security Services (MSS)
 * Cyber Intelligence Services (CIS)
 * Red Team Services (RTS)
 * Governance, Risk and Compliance (GRC)
 * Cyber Technology Integration (CTI)
 * Cybersecurity for Internet of Things (IoT)

CIPHER LABS
 * Cipher Labs

INDUSTRIES
 * Financial Services
 * Manufacturing
 * Healthcare
 * Logistics
 * Gaming
 * Energy and Utilities

INSIGHTS
 * Blog
 * Podcast
 * Events
 * Resources

COMPANY
 * About Cipher
 * About Prosegur
 * Why Cipher
 * Work with Us

GET IN TOUCH
 * Contact Us
 * Free Trial

LANGUAGE
 * ES
 * PT


CIPHER © 2022 ALL RIGHTS RESERVED | Privacy Policy | Cookies Policy

USE OF COOKIES

At CIPHER we use Cookies and similar proprietary and third party technologies to
improve our services and show you advertising related to your preferences by
analysing your browsing habits. By clicking "ACCEPT ALL COOKIES" we consider
that you accept their use. You can change your Cookie settings or refuse their
use by clicking on "CONFIGURE".
These preferences may be modified at any time in the "Cookies Policy" tab on
each page.
You can also obtain more information in our Cookie Policy.

ACCEPT ALL COOKIESCOOKIE SETTINGS

Cookies Policy
Close

COOKIE PREFERENCES

What are cookies? Cookies are small data files that are installed on the user's
computer or mobile device and allow the user to store or retrieve the
information generated by their activity on the network, through their computer
or their mobile devic...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
These cookies ensure basic functionalities and security features of the website,
anonymously.

CookieDurationDescription__cfruidsessionCloudflare sets this cookie to identify
trusted web traffic.__hssrcsessionThis cookie is set by Hubspot whenever it
changes the session cookie. The __hssrc cookie set to 1 indicates that the user
has restarted the browser, and if the cookie does not exist, it is assumed to be
a new session.cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie
Consent plugin, this cookie is used to record the user consent for the cookies
in the "Advertisement" category .cookielawinfo-checkbox-analytics11 monthsThis
cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the
user consent for the cookies in the category
"Analytics".cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR
cookie consent to record the user consent for the cookies in the category
"Functional".cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR
Cookie Consent plugin. The cookies is used to store the user consent for the
cookies in the category "Necessary".cookielawinfo-checkbox-others11 monthsThis
cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the
user consent for the cookies in the category
"Other.cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR
Cookie Consent plugin. The cookie is used to store the user consent for the
cookies in the category "Performance".viewed_cookie_policy11 monthsThe cookie is
set by the GDPR Cookie Consent plugin and is used to store whether or not user
has consented to the use of cookies. It does not store any personal data.

Functional
functional
Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.

CookieDurationDescription__cf_bm30 minutesThis cookie, set by Cloudflare, is
used to support Cloudflare Bot Management.__hssc30 minutesHubSpot sets this
cookie to keep track of sessions and to determine if HubSpot should increment
the session number and timestamps in the __hstc cookie.bcookie2 yearsLinkedIn
sets this cookie from LinkedIn share buttons and ad tags to recognize browser
ID.langsessionThis cookie is used to store the language preferences of a user to
serve up content in that stored language the next time user visit the
website.lidc1 dayLinkedIn sets the lidc cookie to facilitate data center
selection.

Performance
performance
Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.
Analytics
analytics
Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.

CookieDurationDescription__hstc1 year 24 daysThis is the main cookie set by
Hubspot, for tracking visitors. It contains the domain, initial timestamp (first
visit), last timestamp (last visit), current timestamp (this visit), and session
number (increments for each subsequent session)._ga2 yearsThe _ga cookie,
installed by Google Analytics, calculates visitor, session and campaign data and
also keeps track of site usage for the site's analytics report. The cookie
stores information anonymously and assigns a randomly generated number to
recognize unique visitors._gat_gtag_UA_86671402_11 minuteThis cookie is set by
Google and is used to distinguish users._gcl_au3 monthsProvided by Google Tag
Manager to experiment advertisement efficiency of websites using their
services._gid1 dayInstalled by Google Analytics, _gid cookie stores information
on how visitors use a website, while also creating an analytics report of the
website's performance. Some of the data that are collected include the number of
visitors, their source, and the pages they visit
anonymously.ajs_anonymous_idneverThis cookie is set by Segment.io to check the
number of ew and returning visitors to the website.ajs_user_idneverThe cookie is
set by Segment.io and is used to analyze how you use the websiteCONSENT16 years
3 months 14 days 7 hoursThese cookies are set via embedded youtube-videos. They
register anonymous statistical data on for example how many times the video is
displayed and what settings are used for playback.No sensitive data is collected
unless you log in to your google account, in that case your choices are linked
with your account, for example if you click “like” on a video.hubspotutk1 year
24 daysThis cookie is used by HubSpot to keep track of the visitors to the
website. This cookie is passed to Hubspot on form submission and used when
deduplicating contacts.

Advertisement
advertisement
Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.

CookieDurationDescriptionbscookie2 yearsThis cookie is a browser ID cookie set
by Linked share Buttons and ad tags.driftt_aid2 yearsThe driftt_aid cookie is an
anonymous identifier token set by Drift.com for tracking purposes and helps to
tie the visitor onto the website. The cookie also allows Drift to remember the
information provided by the site visitor, through the chat on successive site
visits.IDE1 year 24 daysGoogle DoubleClick IDE cookies are used to store
information about how the user uses the website to present them with relevant
ads and according to the user profile.test_cookie15 minutesThe test_cookie is
set by doubleclick.net and is used to determine if the user's browser supports
cookies.VISITOR_INFO1_LIVE5 months 27 daysA cookie set by YouTube to measure
bandwidth that determines whether the user gets the new or old player
interface.YSCsessionYSC cookie is set by Youtube and is used to track the views
of embedded videos on Youtube pages.yt-remote-connected-devicesneverYouTube sets
this cookie to store the video preferences of the user using embedded YouTube
video.yt-remote-device-idneverYouTube sets this cookie to store the video
preferences of the user using embedded YouTube video.

Others
others
Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.

CookieDurationDescriptionajs_group_idneverThis cookie is set by Segment.io. The
purpose of the cookie is currently not identified.AnalyticsSyncHistory1 monthNo
descriptiondebugneverNo description available.drift_aid2 yearsNo
descriptiondrift_campaign_refresh30 minutesNo description available.li_gc2
yearsNo descriptionUserMatchHistory1 monthLinkedin - Used to track visitors on
multiple websites, in order to present relevant advertisement based on the
visitor's preferences.

Save & Accept