Beyond Viruses: 5 New Threats To Internet Security

Virus protection technology has advanced quite a bit since the birth of the Internet, but just like real world diseases, computer bugs are constantly evolving. Hackers are finding new ways to break into your system and get a hold of vital information. Here are 5 of the most devious new threats to Internet security.

1. There’s an App for That

With the latest smartphone trends, the world of applications is expanding rapidly. Unfortunately, you can easily infect your mobile devices with worms and malware if you aren’t careful about what app you download. A simple game you found online might contain a program that will steal your contact numbers or even jack up your phone bill. A surefire way to avoid these smart phone bugs is to only download applications from your carrier’s official app store.

There’s no reason to panic just yet. Virus protection is improving just as quickly as hackers create new ways to mess with your computer, so there will always be a way to safeguard your information. As long as you take precautions every time you access the Internet, you shouldn’t have to worry about getting hacked.

2. Micropulses Don’t Need Your Data


In a recent study, researchers have discovered a form of electromagnetic interference called micropulses that can deliver your information directly to hackers. Micropulses can even be transmitted by your own fingers on a keyboard and carry loads of confidential information gleaned from your own online activity.

Because our devices are rarely disconnected these days, micropulses may become a huge a problem — that is, if it weren’t for current research efforts into protection. In the meantime, you can diminish micropulses by using an on-screen keyboard or even wrapping your connection cables in aluminum foil to reflect the interference.

3. Can You Trust Your ISP?

It’s rare that a virus can be downloaded directly by your Internet Service Provider, but this kind of infection is possible. Once a hacker grabs your IP address and accesses your connection, they can transfer all sorts of nasty software that will compromise your service. You’ll definitely want to make sure you are paying for the best service you can use.

4. Let’s Go Phishing

Phishing involves sending users official-looking emails with urgent subject lines that can easily fool anyone into accessing the malicious files contained within. Sometimes sinister website will disguise itself as one you commonly use, such as Facebook, and trick you into giving up your info. Once you’re aware of how phishing works, however, you’ll be able to keep a better eye out for suspicious emails or websites. Always make sure URLs are correct and secure before disclosing information.

5. Bugged Webpages

If you enjoy spy movies, you’re probably familiar with the process of “bugging” something to obtain information. Although hackers can’t exactly hide cameras or tape recorders within websites, they can use cookies to monitor your every online move (and even log your keystrokes). With the data these bugs collect, they can alert hackers or advertisers to your internet presence and leech valuable info. Be very careful when utilizing a browser’s cookies.

You May Also Like

About the Author: Shameem

I am Shameem, Software Engineer, Web Addicted, Living in Chennai, India.


  1. Hi Selman, i love your article, especially in the area of Phishing emails. We’ve had attacks on blogs here in this part of the world where hacker hijacked blogs from their owners by sending them phishing emails fooling them that their blogs would be deleted in 24 hours if they do not click on the link. They fell in the trap because they clicked on the link thus giving up their blog.

    One need to be extra vigilant online by following the tips you have shared in this post. Thanks.

  2. It is really nice topic and some of your points startled me. I don’t know much about micro pulses and wonder how our fingers are carrying them to infect? Some explanation and references on this will be highly appreciated.

  3. Good reminders here!

    Be safe, be smart and NEVER be in a rush to click on a link. Only click on trusted sources.


  4. No matter how careful and protected we thing our devices are we can never be too protected, we are our first line of defense to such threats and as such we should be careful with what we share online and what we save online. Thanks for sharing.

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.