Types of Malware



1). Virus:



  A computer virus is a malware attached to another program such as a document which can replicate and spread after an initial execution on a target system where human interactions is required.

Many viruses are harmful and can destroy data, slow down system resources, and log keystrokes.


2). Adware:



  Adware refers to a type of malware that displays unwanted advertisements on your computer or device. Adware is commonly activated unknowingly when users are trying to install legitimate applications that adware is bundled with.



   While sometimes adware can be safe some pop-up windows intend to not only display advertisements but also collects data and information in order to target you with customised adverts. In these cases adware can direct you to malicious websites and infected pages through various advert links, putting you at risk of computer viruses.


3). Spyware:



  Spyware is a type of malware or malicious software that collects and shares information about a computer or network without users interaction. 



It can be installed as a hidden component of genuine software packages or via traditional malware vectors such as deceptive ads, websites, emails etc., Spyware can use keyloggers inorder to collect usernames, passwords, account details. An attacker can see the whole actions performed in the victims mobile. 


4). Trojan:




   A Trojan virus is a type of malware typically presented to its victim as legitimate software.

Cybercriminals use trojans to gain access to a system. They can even include"backdoor" technology to provide regular access to a computer once it has been compromised. Users are typically tricked into loading and executing trojans after downloading trojan-infected software. Once, activated, trojans can allow cyber criminals to steal sensitive data of the users.


5). Worms:



  Worms have been around even longer than computer viruses, all the way back to mainframe days. Email brought them into fashion in the late 1990's. And for a nearly decade, computer security pros were besieged by malicious worms that arrived as email attachments. One person would open a wormed email then the entire company would be infected in short order.


6). Rootkit:



  A Rootkit is a software used by cyber criminals to gain constant administrator-level access to a computer or network. A rootkit is typically installed through a stolen password or by exploiting system vulnerabilities without the victim consent or knowledge.

Rootkits may be also presented as a trojan or even as a hidden file along with a seemingly harmless file. This can be graphic or even a silly application is distributed via email. When the victim clicks the program or graphic, the rootkits are installed on their system without their knowledge.

»»For detailed information about Ransomware Click here




Post a Comment

0 Comments