Games Are A Malware Author’s Favorite Tool To Use

When you are in business you need to direct attention to yourself to be able to make the sell. That is why so much of the advertising that you see on TV and on the internet is pretty much loud and obnoxious. They want to make sure that you are looking before they try to make the pitch at you. If enough people look their way then they are sure to make enough sells. But to get people to look that way you need something that is going to entice them.

Black hat hackers work the same way. No matter what you might think of hackers you cannot forget that what they do is an illegal business. That means you must think of it as a business first and illegal second. That is the key to stopping them. They need to get the attention of the people who they are attacking. Most of the work that a hacker has to do, after they create the code for the attack, is passive. They need you to look at the site and to then click on the link. So they must find some way to get you to do that.

Games Are A Malware Author’s Favorite Tool To Use

One of the ways that they have found to work is to put the malware into games. The one thing that people love to do on both the internet and on their mobile phones is to use games (not the ones above of course; they’re mine and they’re cool!). The people who are considered gamers play the hardcore games on both the internet and their mobile phones while others play casual games. It is a great way to waste time and it is also a great way for hackers to deliver their attack.

When people are playing with their games they are not scared to click on links. So if you have delivery mechanism that people are not scared to use then that makes for the perfect vector for a black hat hacker.

If you play games online or on your phone you must remember that they can be infected as well. Be careful on what you play and you should be okay.

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.

Speak Your Mind

*