Skip to content
Skip to main content

About this free course

Download this course

Share this free course

Introduction to cyber security: stay safe online
Introduction to cyber security: stay safe online

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

3.1 Threats to your assets

As you have already seen, for many the threats are most likely to arrive as emails or attached to emails. Another significant threat comes from apps for mobile devices that are not what they seem. In 2019, Sophos reported apps that hide their icons and use other tricks to prevent the user uninstalling them while aggressively displaying advertising.

Other examples reported include:

  • Many utility apps don’t initially contain malware but include the code to download and install malware from elsewhere. This extra code installed may be designed to collect your banking details, or lock you out of your phone until you pay the criminals.
  • A VPN client that installs a trojan designed to capture banking details.
  • Fleeceware – apps that pretend to offer a free trial for some simple function and ask you to provide banking details first. Even after uninstalling the app, users still get charged a large amount unless they explicitly cancel the trial.

You can find up to date Sophos reports at: en-us/ tag/ android-malware/ [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]

For the final activity this week you’ll update your own list of cyber threats.

Activity 5 Your threats

Timing: Allow about 5 minutes

Update the list of information assets and online activities you compiled in Taking stock of your information assets. Add any threats that are relevant to your assets.

Save this list to use later in the course.

Next, you have a chance to review your learning in the end-of-week practice test.

Described image
Figure 11