Anonymity Online

Meanwhile, the growth in the number of devices interacting with each other in the Internet of Things (IoT)

opens up additional interesting opportunities: what if an infected car drives off the road, or an infected “smart” oven continues to heat up until the normal load is exceeded? Malware of the future can make such physical damage a reality.

Users have a number of misconceptions about malware: for example, many believe that signs of infection are always noticeable and therefore they will be able to determine that their computer is infected. However, as a rule, malware does not leave traces, and your system will not show any signs of infection.

Also, do not believe that all sites with a good reputation are safe.

They can also be hacked by cybercriminals. And visiting a legitimate site infected with malicious code is even more likely for a user to part with his personal information. This is exactly what happened to the World Bank, according to SecurityWeek. Also, many users believe that their personal data – photos, documents and files – are not of interest to the creators of malware. Cybercriminals, on the other hand, use publicly available data to attack individual users, or to collect information that will help them create phishing emails in order to penetrate the internal networks of organizations.