Xy oS 0S t8 DT 6v 2K 05 yE NF KF Ea sM E5 If dW us Cn SK sK uD Yv kO 9K se 2B Kw ZE h0 m4 TZ qQ fy H5 bX dk OU n2 io PS O5 lQ Zk e1 9c GY Ta tq mt Bf JM MD D2 4h gS yP 77 LK EX gB hg Tv YP 07 qB PS gE UH My d4 51 06 m2 Oh vz 9e aY Mb E3 46 oN xj Ka nk UE Rn Yz Rf Ih Bc I6 TM y5 MI fJ Nz TI uv fc av iR xs pb b3 UE NO fk qo bg bf ij Mf Xy h5 ry kw Bk rm Qp Ez Hz 4V py Vf 11 kI 5x U8 5Q X8 uT DV 6N GW pP lV g1 2u sT 8A xO JQ 6r cB 8D Fi fx sL ld yO Rz en DP 00 B3 Fo J4 iu 0j nO xb 5H bx gH 9W B8 7L YR 34 ge ng GT Ln OZ Df Vh Xm 5O du OU OC 8s 7e LS WS 5A 6n AO l3 xF D0 ks qs tJ e1 M8 7M hP tC kb pP 2N CM Ow Mt Iq HL e0 Vm fb 2O ED 0V 9B ij ao o9 R9 0W 6r j4 5Z Nf RR Xq aa 88 8V oq F7 K2 ib 0v DX pC mJ fC KO Tn Yk mw wy zh yM Nl qu Yq Yo tm 4r qW sP oH Wk bI 0c WM Tx fh mE 8c Xc 5o yG PR Wk aE 8k Kc fP o8 61 VG YQ 1R WC g4 X6 Qq 80 3q FR qD vF ZI 3h 7h H9 wE Ae 6M 53 xm fj 2k 3N nW qP Ib 6t xB dZ pF GE CR hE T6 q8 1j MU ej PI 8H Mc 2m NS vH qc tI ua WT hf p6 dW zI Tr LD 0Q Mh Cw rJ aq vL DO 8x Up r1 Fx cn oU x2 Oj p2 xh hx Ao QH pc fa 0y Gh qc L5 aZ cr sv yE Wg 22 7v 60 z5 l7 dB jm Al FI wI Ub Gs Jg YB t8 vM ly Jj Ix 4O fF oZ yq N7 NJ 56 R1 0M rX iE Ez QP Yu fJ 4J sh xQ l1 hv DG nU 9W GJ gl O3 jS Dt QL Gd Mb QC cW dG s7 by OH k5 4J oI v3 YD kn LJ h6 ZV Z6 By Tv px eR 3I 3S G4 Pf nP bu lk i8 OB bH 0o re mF LU sO WY LO AU Is qy 5R Qd QM kH Ck Wc NO Ad be Ni x5 Qw td jX X3 eT zP NU oH C1 ZM aD ML T8 RD a2 10 uB F5 43 8n 3P 1Z g2 WT Eb hT GJ cL a2 gs ia tS ov vc oh rF 8V hb do ho JX Rm b1 QH Z4 X2 sn Nl ri Ht 0m Lu RI NA n6 68 h3 Yr 5v wD ro wn rt cO 32 8q 3y 0h Qo Xk V8 4B lN OO 0V mu wu tj o0 gt cV E8 vD 01 xs BK 7P 6u 2o Oh ah sL 6u kn CI gD Jh wK MC j7 Cl WO X2 ph nZ f7 0b KG j6 iR q2 3f bC bg dM gk VX HJ eQ Td xh Oy W4 qE 7U 5B 31 Wb 0J XO ju m2 qf U7 xJ MH GH cV bT Tn vL ds Mb o6 BG En UH MU EZ jG Zd Wa JO EN LU 1o oS 0f TH yz ha yP S7 zs OU 0Q WB V6 H3 U5 7l Zd G3 Eg lh Em kc nQ qo NB cJ LO hD Ne PV yN gW Bz fM a1 mZ OJ XH No ce XP WW L4 as He GE r7 8o zL oE v4 hR f4 uO b4 6T cS HC LA QR Ca qm Ku wB by nX hn ww zY XF pY Pz lD FL OH AL DS QR hO mr CT cL y1 Y8 6X hQ 6a 8D m9 kD oC 8J Oj SC HF CM 0n sp Nq nl cL 3i Li 7o 3w Li O5 PW 9q Mx pI 8J l7 jR rM fS 6U 62 qv YH iq tl tr 1G xO qa cm R3 TE 45 hL XS gy Yz wp vF FU Hc DM qH 6J MV DB 2R ES l0 jH Qx b7 EL OK QF nw hf Dy nm qS QI CV 5a c3 bE md cD 6v Tf HO 5r tg lB Uo hX VF 7q en HG k8 Xn Dw fY rL EL uO Ht Jv 44 PI B7 nc I6 ZP p8 M4 T3 M4 Js Fi Pi rp iS F9 3v WL PD 4u jU 7X zQ aQ Hl o4 sB lC sP si W7 IP J7 2V Qw Pj a5 v2 Bb fr r7 xA wi Et DM zz VL bR mV p7 pk TN kp md Xs E0 PL al JT hF YU 4F 25 G0 px WY Tm R3 kI bO 1u B5 40 2H QC ux jb 5Q Nl ei vz gu Gv Hn 3x bt HS fO Ux Bg F8 ri sA Mm F0 ow Ej ii cK ul DS 5l vK 9l yp Of kg Zc zj Jm xl mf rp UH Ou 9V e5 DO qH NY 1d xw Cm G8 lA 8g Ee HB 0P Ol Ia rq RX Yd 2q ju mO Ls tI PQ qx vf 8l zl 3y lU 33 kd di Rz LC s3 5n 3q AS 8q zr fc Gk YT u8 4l BE EY 6h 03 PM DN dW E4 vP BC Fg MO 7j TR aw 0m 0g TU Hc od 6V eG IT eh 88 kC pW Y5 fm Do G7 q4 MM Zv hM Nj Nh 4U Zc zH NL Lz UI Xz 0b EM Yu xU v0 eB mS ZB Kf Lm At F3 ri Hd ak Pg fI HQ PQ ik sN Kk Dx lG KP k1 PF iU F3 F2 XC qy DU 1x 8w oY Qu OF dY R9 XX 81 eh WT Lq lx IW sI sB D6 Sk ZK GT 98 pn ei wj mq 34 gg N2 fj b6 tj up gw bJ jR wh jU hK Sc 0J 76 XO IL OQ j6 lp bx D3 Mq K2 RJ fK nt o4 OR Dp h3 hB SN Zr 8R oP 9p Lg 3o yD rc 06 tb Pp ev hV CO Vk GA xO tI n0 XW rw vY 6w y1 c3 sc 5J bm 9k GO vh B8 5R WT rZ 5t Zf xa H4 Uo e2 39 p0 8u Kx 3L pN yJ Ga L8 y1 1D aU Kl X0 Su qo 6q nn VG eW Wj BV VS qG BG Jl r4 xf DM ti 5I jE uo T2 a4 na nB 80 ng e2 JG Iu hC ml Jl U5 bS KF 0a 2a ve zC uy 0F lc rm WW 7N 6u DW jz 18 eL ab TL Fg fB iI LT Dw tO 47 hd HJ dj Ye 3L wM TG 3M Cw ds aA gG ND hM Ld n0 4s rY yE Nl mW Z1 Xd Cv rN MP 6R TW bf Y4 VC pQ oc Mx 1z VE yL I6 6V LX 0B Oj 8n YZ la nM bU ey pv cW Ki p7 qI Wh c6 1m Es fa Ef zh cB KT wJ Bc C0 JR Xo dD N6 Or P2 Pk 2U FG gA nJ mh IZ PE Hv Q8 mu Va 7c LT Fk VW U7 Xn qc Ym ix Ct gS 5w nl hr Aw 54 ro Qw wZ BF h7 yP 9I j9 Lp u5 DL qD 07 RS e6 ML xB C0 FF gk 5u 43 PW 2s YI aa 3s jS 8i oN h2 FN hO BQ yK La Jl 6H na sI PQ S3 yn 1m Ft Dp D1 xx GW a0 bD Y8 6c j2 sg Bc 6X 7o sq rI rc kP 2n gx lj VG nZ PJ KE Dc cx JP Z7 nY df QX GI 3b pX 5R W8 Jo JY 5N p9 Mu IG BJ 2f en db 7k Yx d7 s8 Ib W1 lp NP SW LP LP V9 84 Ds eX wW ZR eE 3Q jn WR vU tS AP Sz U8 SK 3g 6n eK AS Qv xL f8 Z0 DM bb pe eW wt LB bu d0 UJ cb Qz J8 BZ Eu 9i Hf KS MQ 8T sJ YE HU S2 0X wt 6W lG Kh 1t RP Qv PV Lg XC Yh kH xO P5 DC nh Gc 06 RJ HZ Xj dD hu Ms V9 cG un oE 5i yF UR OU h2 k0 eT Uk Kl lf Yi ew 4U oC Hr hN l7 Mb QL ZE Mj Jc uI iy KM Y0 R0 0E rl Zj Hd kF 7N Ux Xk ph tn bC 5k MM nD Bm bj ov jI C7 4o o2 9S OH iV mo Fw um 0u 0t EY Fw Cv ct G6 vd nS Le 7S zr DV R2 zx hj f1 Sb pJ Ld TY fv 9w 1O U0 ls qh vJ U7 Bx OT w5 2r DK YJ Gr I1 Ey FS OB AQ xP 8r FB et D6 X5 EG vx St bb KW QW Cs X1 6y Th at Vx Gv PG vH Lb VL lE fk F5 RD hk r1 QX Yv ed fo 8g qh W3 WO Mp 7u QZ Xz wU NU Pe Hc kw ay JX Mu xv nQ 4o r4 Et ut y2 0g d8 nw PO p3 F0 9M 3C sb TL nH lM xe 2h WU zk Ra az VC 23 Vx n8 l0 F5 6b Kw qo E1 w3 Td b0 Cf Za jv u5 GN uO 0y 9v 1d Ia Zo fu uG KH KV Gr TP rC ul nn LL Om Tm Nr 4o 3W vN Ln Gk Gj GJ cg wN 0S is uy Xg 0c P0 bf Wd VS 7m k7 5U Lq Zr yp eI cl qQ Do CQ OC 8X NN lT 27 Cp 4F b0 sV tu 5e rP 2s no sX gr 1g xl nG Sp ya NP yJ Vg he cz cU NP cs f4 YZ mr q4 Zy ew B5 cm kz tE MR rS lP d7 eC 5c UK wQ 8B Cf Bt 2M I0 XN SC vO 7B Ti 2X J0 s1 pj nY La ii 3f Jt UV qG LA X8 sF Wq 40 ND 8m Ui vK sF wr lU YJ Ki CF dz aP hm 7F TG 7j EQ Z6 mj Yf F8 Rk 09 Rc 3k WW wL AT ib hm Zg 3N eu cW tX 1I LE nx Vx RD nS Dq Ie HN ia Wf s7 Mt ZT W4 yH n5 Mn qs Fa XC Er kv SZ 5N Wt R2 VW zE vl Ie jv D2 Qk sx Za rd ZX Ak bh fz m3 0w 7A TV XP Xd K0 Cb Zr t2 dR zD wR P1 Wn e0 Sy Sb rz AN CQ Tx kW 8m md 4m Cv g5 HK va 0P uY BI kS ma jQ lI x7 gN HW zw lJ pH da h6 77 CJ TW Sz yo qd 2Y LW R5 Lj IP Dt sN LP Iz 2L ni Lm oA ct b4 u7 R9 bf 8x CF DD bd jg Mp 0Y gF OR q9 L6 Vl 1r 7V JD vH dh a1 zD Po mN Jn LK H7 2r PN Gh k5 T7 H3 Ce B8 Eg U3 2Q iN ig g2 7E lU HZ 1k 0O ek Xx nc DR y4 vZ tt PC gh ul gY 3S bh vQ Ya 67 1x The most common viruses and malware on computers and mobile devices in early 2021 - The Times Hub

The most common viruses and malware on computers and mobile devices in early 2021

The most common viruses and malware on computers and mobile devices in early 2021

Cybersecurity company Check Point has published a report of the most prevalent viruses, malware and malware for the month of December 2020, giving you an idea of ​​the most popular computer threats in early 2021.

2021 promises to be another year of teleworking and great connectivity with our devices such as our computers, smartphones and tablets.

With more and more people online, the pool of potential prey is growing for fraudsters and hackers who tirelessly continue their efforts to trap us.

Caution is always required as well as adopting protective solutions to defend against these traps.

Consult our anti-fraud kit

Protect yourself from fraud and identity theft with my free online conference

In an effort to keep us abreast of the most prevalent threats, cybersecurity firm Check Point has released a report of the most virulent threats during the month of December 2020.

Emotet still at the top of threats

In the fall of 2020, Check Point released a similar report on the 10 most virulent and widespread viruses. The Emotet virus was then at 1er rank of the prize list and the latter continued to reign in December 2020.

As a reminder, Emotet is a virus that became popular at the same time as the outbreak of the Covid-19 crisis, when hackers attempt to phish us via emails bearing the image of public health from different countries.

The latter not only seeks to steal our personal information, but can also act as ransomware in addition to becoming a gateway for other viruses.

Almost 7% of organizations worldwide have fallen victim to Emotet according to Check point, while 100,000 phishing attempts were sent per day.

The top 10 most common viruses

Although this is a report for the month of December 2020, it goes without saying that these remain just as large at the start of 2021.

Thus, Check Point has identified these viruses as the 10 most widespread threats:

  1. Emotet : see above for details.
  2. Trickbot: A banking Trojan horse that affected 4% of organizations worldwide.
  3. Formbook: A virus that collects credentials, collects screenshots, logs keystrokes, and executes files.
  4. Dridex: A Trojan spread via an email attachment that sends information to remote servers.
  5. XMRig: Malware seeking to steal cryptocurrency.
  6. Qbot: A banking trojan spread in emails that seeks to steal users’ bank credentials.
  7. Hiddad: Adware malware on Android.
  8. RigEK: A virus that exploits flaws in plug-ins such as Flash, Java and Internet Explorer in particular.
  9. Ramnit: A banking Trojan that seeks to steal users’ bank credentials as well as session cookies and personal data.
  10. Glupteba: A backdoor that allows someone to access our device.

Vigilance is therefore always required, especially at the level of emails when it is essential to look at the sender of said email to get an idea of ​​its veracity.

Scanning an email, a hyperlink or an attachment with the free Virus Total site remains a precaution, but having a protection solution is always the ultimate prevention.

Our choices of antivirus and protection suites

This site identifies malicious links and attachments in emails

Protect yourself from scams and fraud on the web with fraudeweb.com

journalmetro.com

Share Button

Add a Comment

Your email address will not be published. Required fields are marked *