This file type is the most used in cyberattacks

Phishing emails with malicious attachments or links are a favorite of the cybercriminal.

This is when the scammer sends an email pretending to be from a legitimate organization in an attempt to trick you into clicking a boobytrapped file. These types of attacks can be a very effective tool for fraudsters, especially in tricking the untrained eye.

But among all the file types that can be used for duping potential victims, this well-known format is the most popular for cyberattacks. Read on and you might be surprised.

This file type is a hacker favorite

Based on a report by Barracuda Networks, the PDF is the most used file type in cyberattacks. Nearly 41 million PDFs were found to be part of an attack in the last three months alone. That’s staggering!

Why are PDFs so popular with cybercriminals? For one, they are easy to create and distribute. Malicious scripts using JavaScript and VisualBasic can be embedded within PDF files and duplicated endlessly.

Scammers typically send these malicious PDFs via phishing emails or links to their targeted victims, hoping to trick them into clicking the attachment.

They can be disguised as anything really. From receipts, delivery notices and invoices to eBooks and application forms, the trickery knows no bounds.

If you fall for a malicious PDF, the consequences can be severe. You and your organization can be infected with ransomware. Your files and data can be stolen. Hackers can install keyloggers, spying software, web hijackers and even take complete control of your computer.

Other file types to watch out for

The PDF format may be the most popular among cybercriminals but it is not the only exploitable file type.

Data formats such as RFTs and Office files like Word documents (.doc, .docx, etc.) and Excel (.xls, .xlsx, etc.) are also used for harboring malicious scripts and macros. According to Barracuda Networks, of the 70 million Office documents it has scanned in the last three months, it has detected more than 4.7 million malicious files.

Compressed file formats like ZIPs and RARs are the other popular file types for hiding malware. It is no wonder most companies are filtering and outright banning these formats out from their emails.

How to protect yourself

This is why it’s so important to be cautious about attachments or links you receive, even the ones that seem to be from a source you know and trust.

If you weren’t expecting an attachment file, but it came from someone you know, check with them before downloading it. If it’s from someone you don’t know, delete it. Legitimate companies don’t normally send unsolicited messages with attachments.

In addition, organizations should educate their employees about the dangers of clicking on suspicious attachments and links.

Beware of Office files that ask you to turn on macros, too. Contact the person who sent it and find out why it needs macros to work. It’s a good practice to disable macros anyway by default.

Always ensure that you have a reliable and secure backup of your files, too. This allows you to recover your data when malware disasters strike and will have you up and running in no time. For your online backup needs, we recommend IDrive.

Psst! Protect your all files with this 50 percent discount for an IDrive subscription, courtesy of Komando.com!

In other news, hackers spreading malware through digital copies of ‘Fire and Fury’

Hackers tend to exploit popular trends too. We’re talking about the recently released book dealing with the Trump White House called “Fire and Fury.” It’s reported to be spreading malware. Click here to read more.

Grab these free Windows essential apps

Microsoft’s operating system comes with good, basic software that can you can use on your computer. For example, Windows 10 has the web browser Edge, a calculator, alarm clock, maps and other tools.

If you want it to do more than the basics, though, you can pay for Microsoft Office 365 and you can add third-party software, like photo editors, graphics programs, utilities, games, productivity software and much more. (Bonus: You can find many of those in the Komando.com Downloads section.)

Continue reading

An AI God?

00:00
–:–

Open/download audioSoftware engineers work to build a new religion

Learn more about your ad choices. Visit megaphone.fm/adchoices

Get hired as a transcriptionist

3 signs it's time to get a new computer

How do you know when it’s time to kiss your old computer goodbye and welcome a new system into your life? You can start by trying to clean up your system with some software-based housekeeping tools, but ultimately, even high-end computers will reach the end of their usable lifespan.

Continue reading

Another reason to dumb Kaspersky

00:00
–:–

Open/download audioRussian hackers stole highly classified software tools from the NSA.Protected at the time by Kaspersky

Learn more about your ad choices. Visit megaphone.fm/adchoices

One minute is all it takes for someone to clone your voice

Have you ever been taken out of context before, or accused of saying something you didn’t? This new technology could cause more problems like this in the future. With one minute of audio, your voice could be used to create thousands of sentences. Should you be worried?

Continue reading

Popular antivirus program mistakenly IDs Windows as a threat, chaos follows

Your anti-virus software has one job: Protect your computer against malware. But one overzealous anti-virus program is improperly flagging Windows files and safe websites like Facebook as malicious. Here’s how to stop this faulty software from throwing your device into a complete meltdown.

Continue reading