What is Malware in Computer ? And Types of Malware
Today Pubg
---
In this post, we will discuss what malware is, and types of malware, and how to protect from these malicious programs on pc.
What is Malware?
Malware refers to programs that are designed to “infect” electronic devices. Malware is usually introduced into a Computer network through phishing, malicious attachments, or malicious downloads, but it may gain access through social engineering or flash drives as well.
Popular Types of Malware
- Viruses
- Trojans
- Spyware
- Adware
- Ransomware
- Rootkits
- Worms
- Keylogger
1. VIRUS
Viruses are computer programs that infect other programs. Most viruses run only when the program they infected runs. This is the main reason why viruses are hard to detect.
The virus has two parts:
1. Infector
2. Payload
The payload is not required means a harmless program is still a virus if it attaches itself to a computer program.
2. TROJANS
A trojan is a program that contains other programs. The container is typically harmless. In fact, it can be a program that attracts unsuspecting users.
Once a user downloads and installs a Trojan program, the malware inside will spread to the target machine.
3. SPYWARE
This is one of the most dangerous malware out of all. Generally, spyware records all activities you will do on your computer and sends this data to the attacker. This data transmission occurs with the internet.
Spyware has two types:
1. Harmless :
Harmless spyware focuses on non-sensitive data (e.g. the websites you visit).
2. Harmful :
Harmful spyware, on the other hand, collects sensitive information (e.g. passwords).
4. ADWARE
Adware is a type of malware that shows advertisements on a user’s computer. This malware becomes extremely active whenever the infected device is connected with the internet.
This type of malware is one of the safest malware malicious programs. it can be irritating if it shows pop-up ads many times.
5. RANSOMWARE
Ransomware is a malware program that uses encryption to disable a target’s access to a victim's data until a ransom is paid. The victim organization is rendering partially or totally unable to operate until it pays.
6. ROOTKIT
A rootkit is a program that gives remote control of a victim’s computer with full administrative privileges. Rootkits can be injected into applications, firmware, or other programs. They are spread by phishing, malicious attachments, malicious downloads. Rootkits can also be used to conceal other malware, such as keyloggers.
7. WORMS
Worms targets vulnerabilities in OS to install themselves into Computer networks. They may gain access in several ways: through a backdoor built into the software, or through flash drives. Once in place, malicious actors can use worms to launch DDoS attacks and steal sensitive data.
8. KEYLOGGER
Link: What is Keylogger and How to Detect And Remove
How to Fight with Malware and Prevent Malware From Your Computer
1. Stay away from malicious websites can help you to prevent malware.
2. Install a trusted anti-malware program that can scan your pc a timely.
Note : If you are active internet user, you should scan you computer once in a week.
Popular Antivirus Software List
- Norton Security
- AVG Internet Security
- Avast Antivirus
- McAfee Antivirus
Thank You.
Post a Comment
Post a Comment