Kumail.pk is a Free Platform of
Different Malware
Cyber AttackThe term malware is the contraction of malicious software. Malware is a broad term that encompasses computer viruses, worms, spyware, adware and others. Malware is a program that is written generally to cause a mess. They can be so dangerous that they can also damage devices. However commonly malware encrypt, steal or delete data, hijack core functions of computing and disturb different activities.
Different Malware
Different Malware
(i) Computer Virus
A computer virus is a computer program that can spread across computers and networks by making copies of itself, usually without the user’s knowledge. It can also modify other computer programs, insert its own code and change computer settings. Viruses are harmful. They can range from displaying irritating messages to make all the documents inaccessible or even delete them. Viruses generally latch on a host le and when they execute they infect other les or programs. Boot Sector,
Resident, Macro Viruses and File Infector are some examples of viruses.
(ii) Worm
A computer worm spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction. It does not need to attach itself to a le or program to cause damage. It can do several malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting les, and consuming internal storage and memory resources.
(iii) Adware
Adware is advertising-supported software. They present endless ads and pop-up windows that could potentially consume memory and processing resources. Adware can also change the different settings of internet browsers like homepage and default search engine. Normally, these are not as dangerous as other malware. However, Adware annoys the user and slows down the processing. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in little
windows that may not be closed. Adware programs include games, desktop toolbars or utilities. Commonly, adware is web-based and collectsweb browser data to target advertisements, especially pop-ups.
Spyware is a malware that monitors a device and steals important information about a person or organization without their consent and sends such information to another person or organization. Spyware takes control over a mobile phone or computer without the user’s knowledge. They capture information like web browsing history, e-mail messages, usernames and passwords and online payment information. Spyware can come through cookies or even when we install software without reading its terms and conditions. System monitors, cookies trackers, rootkits and key-loggers are few examples of Spyware.
What Can Malware Do?
Malware delivers its payload in a number of different ways. From demanding a ransom to stealing sensitive personal data, cybercriminals are becoming more and more sophisticated in their methods. The following is a list of some of the more common malware types and definitions.
Types of Malware:
Virus
Possibly the most common type of malware, viruses attach their malicious code to clean code and wait for an unsuspecting user or an automated process to execute them. Like a biological virus, they can spread quickly and widely, causing damage to the core functionality of systems, corrupting files and locking users out of their computers. They are usually contained within an executable file.
Worms
Worms get their name from the way they infect systems. Starting from one infected machine, they weave their way through the network, connecting to consecutive machines in order to continue the spread of infection. This type of malware can infect entire networks of devices very quickly.
Spyware
Spyware, as its name suggests, is designed to spy on what a user is doing. Hiding in the background on a computer, this type of malware will collect information without the user knowing, such as credit card details, passwords and other sensitive information.
Trojans
Just like Greek soldiers hid in a giant horse to deliver their attack, this type of malware hides within or disguises itself as legitimate software. Acting discretely, it will breach security by creating backdoors that give other malware variants easy access.
Ransomware
Also known as scareware, ransomware comes with a heavy price. Able to lockdown networks and lock out users until a ransom is paid, ransomware has targeted some of the biggest organizations in the world today — with expensive results.
How Does Malware Spread?
Each type of malware has its own unique way of causing havoc, and most rely on user action of some kind. Some strains are delivered over email via a link or executable file. Others are delivered via instant messaging or social media. Even mobile phones are vulnerable to attack. It is essential that organizations are aware of all vulnerabilities so they can lay down an effective line of defense.
How to Protect Against Malware
Now that you understand a little more about malware and the different flavors it comes in, let’s talk about protection. There are actually two areas to consider where protection is concerned: protective tools and user vigilance. The first is often the easiest to implement, simply because you can often set and forget best-in-class protective software that manages and updates itself. Users, on the other hand, can be prone to temptation (“check out this cool website!”) or easily led by other emotions such as fear (“install this antivirus software immediately”). Education is key to ensure users are aware of the risk of malware and what they can do to prevent an attack.
Apply for Free E-Certification