In this post, we will discuss what malware is, and types of malware, and how
to protect from these malicious programs on pc.
What is Malware?
Malware
refers to programs that are designed to “infect” electronic devices. Malware
is usually introduced into a Computer network through phishing, malicious
attachments, or malicious downloads, but it may gain access through social
engineering or flash drives as well.
Popular Types of Malware
- Viruses
- Trojans
- Spyware
- Adware
- Ransomware
- Rootkits
- Worms
- Keylogger
1. VIRUS
Viruses are computer programs that infect other programs. Most viruses run
only when the program they infected runs. This is the main reason why viruses
are hard to detect.
The virus has two parts:
1. Infector
2. Payload
The payload is not required means a harmless program is still a virus if it
attaches itself to a computer program.
2. TROJANS
A trojan is a program that contains other programs. The container is typically
harmless. In fact, it can be a program that attracts unsuspecting users.
Once a user downloads and installs a Trojan program, the malware inside will
spread to the target machine.
3. SPYWARE
This is one of the most dangerous malware out of all. Generally, spyware
records all activities you will do on your computer and sends this data to the
attacker. This data transmission occurs with the internet.
Spyware has two types:
1. Harmless :
Harmless spyware focuses on non-sensitive data (e.g. the websites you visit).
2. Harmful :
Harmful spyware, on the other hand, collects sensitive information (e.g.
passwords).
4. ADWARE
Adware is a type of malware that shows advertisements on a user’s computer.
This malware becomes extremely active whenever the infected device is
connected with the internet.
This type of malware is one of the safest malware malicious programs. it can
be irritating if it shows pop-up ads many times.
5. RANSOMWARE
Ransomware is a malware program that uses encryption to disable a target’s
access to a victim's data until a ransom is paid. The victim organization is
rendering partially or totally unable to operate until it pays.
6. ROOTKIT
A rootkit is a program that gives remote control of a victim’s computer with
full administrative privileges. Rootkits can be injected into applications,
firmware, or other programs. They are spread by phishing, malicious
attachments, malicious downloads. Rootkits can also be used to conceal other
malware, such as keyloggers.
7. WORMS
Worms targets vulnerabilities in OS to install themselves into
Computer networks. They may gain access in several ways: through a backdoor
built into the software, or through flash drives. Once in place, malicious
actors can use worms to launch DDoS attacks and steal sensitive data.
8. KEYLOGGER
How to Fight with Malware and Prevent Malware From Your Computer
1. Stay away from malicious websites can help you to prevent malware.
2. Install a trusted anti-malware program that can scan your pc a timely.
Note : If you are active internet user, you should scan you computer once in a week.
Popular Antivirus Software List
- Norton Security
- AVG Internet Security
- Avast Antivirus
- McAfee Antivirus
Thank You.
Post a Comment