• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / The Complete Guide to Online Threats: Part I

The Complete Guide to Online Threats: Part I

April 23, 2014 by Natalie Novitski@ iHLS

A glimpse behind the scenes of virus creation, in a must-read article that could help you prevent digital mishaps and disasters. We won’t give any hacking tips, but we’ll hopefully help you understand the threats lurking in the dark corners of cyberspace.

We keep warning you against online security problems, how you leave digital footprints by using your personal information to access online services. Now we’ve decided to tell you about the real-world implications of using the net irresponsibly, and how disturbingly easy it is to hack your computers, steal credit card information, access bank accounts and even steal your very identity. We visited the Cyberhat company cyber labs on your behalf, bringing you information on the latest hacker trends. Cyberhat was established by Cyberia – the Israel Aerospace Industries cyber labs, in cooperation with Secoz.

The most basic trojan horse can be downloaded for free online. Some, like any other downloadable program, come with a user manual – they even include a user agreement you have to verify (hacker humor?). You can make the trojan look like any other innocent file. You don’t have to be a hacker to do all this, all that you need is the ability to download a file and some basic understanding of human nature.

A hacker’s goal is to create a sort of trap, using an irresistible bait that will cause even normally alert users to ignore all safety regulations and even their antivirus alerts.

“People are naive, and that method is very common,” this according to Cyberia CEO Guy Mizrahi. “In this case they send an e-mail with an attached file. Once you open it you can see its contents – but you’ve also been infected with a trojan horse. There are others ways, too. For example, while surfing you might click on a link and get a message asking you to update one of your programs. If you press “yes” you’re infected.” If you think only extremely naive users fall for these traps, you’re wrong. One of the most famous infiltration incidents was a cyber attack on foreign ministries, using files that ostensibly included “inappropriate” pictures of French singer Carla Bruni (men…); this happens in the best and most secure computer families.

Once the victim opens the file a connection is opened between the infected computer and the trojan-using hacker. Naivety leads to users being infected with their very own, private espionage network, who runs on their computer, collects data and even modifies the system. “Once it’s installed the trojan reaches out from the infected computer and connects to the attacker. Sometimes firewalls block incoming traffic – but it’s relatively easy to send outgoing communications. Once my trojan makes it in and calls me back – I’m in control of the infected computer. I can do whatever I want,” said Guy Mizrahi.

What kind of information are we talking about? Everything. Documents, applications installed on the computer – the hackers can even neutralize or bypass any element that might delay them, such as antivirus. They can also control the computer’s microphone and internet camera – literally spying on the user and watching everything they do. Attackers can access all the passwords that are stored on the computer, even those that aren’t stored: Sky’s the limit. So, for example, if you have an trojan running in the background and you’ve just accessed your bank account online – the attacker spying on you can collect information on the banking website you just used and find out your user name and password.

In the following parts we’ll tell you about more advanced methods used by hackers to access computers and smartphones, followed by a review of malicious software found on darknet – some even acquired by official state authorities.

* This article was originally published on iHLS (Israel Homeland Security).

 

Filed Under: ACD/EWI Blog, Cyber, Economic warfare

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.