Wednesday, December 23, 2020

What is Malware? Definition and 6 Examples

 
malware
malware

What is Malware? Definition and 6 Examples
During my many years of teaching computers, from basic skills through to the more advanced use of digital media software, as well as when working with computers on a personal basis, I believe that I've encountered pretty much every kind of malicious software out there. This article gives a definition of malware examines six examples and outlines three approaches that can be used to minimize or prevent being affected by malware.
Definition of Malware
Malware is malicious software that has been designed with the intention of disrupting, corrupting, or otherwise damaging a computer system, typically through gaining unauthorized access.
6 Examples of Malware
Here are 6 malware examples:
  1. Virus
  1. Trojan
  1. Spyware
  1. Worm
  1. Adware
  1. Ransomware
I will explain each example in more detail below.
1. Virus
In computer terms, a virus is a malicious piece of code or a program that is capable of copying itself and spreading from one computer system or device to another. Viruses are usually written with the intention of having a disruptive effect on the machines that they infect, causing such issues as the destruction of data, or the corruption of the operating system. Viruses typically work by inserting or attaching themselves to legitimate pieces of software in order to facilitate the execution of their code. The best way to protect a device from a virus is by installing anti-virus software and keeping it up-to-date.
2. Trojan
A Trojan (or Trojan horse) is a form of malware that hides its real content to trick the computer user into believing that it's a legitimate file. One common way that this deception happens is when a trojan arrives attached to an email from a trusted source. Unlike, viruses, which can activate and replicate themselves, trojans rely on the user to activate them. Computer Trojans are named after the wooden horse that was used to sack the ancient city of Troy. The wooden horse was built and left outside the city by Greek soldiers who were besieging Troy. The horse was thought by the people of Troy (known as Trojans) to be a harmless victory trophy, so they brought it inside the city walls - but inside it were Greek soldiers who emerged at night and opened the city gates, enabling the invasion and fall of the city.
3. Spyware
This type of malware infiltrates the computer system, accessing and monitoring the user's activities, such as internet usage data and sensitive information. It then relays this personal information to advertisers, data firms, or others. Spyware is a threat to both businesses and individual users and is used for many purposes, such as to track and sell internet usage data, steal credit card or bank account details, or for identity theft. It does this through actions such as tracking the user's login and password information and spying on sensitive information.
4. Worm
Worms typically use computer networks to spread themselves. They exploit weaknesses in security software or can arrive via spam emails or instant messages. Once established, the worm can then use the host computer to scan and infect others. Worms can corrupt and delete files, or create additional malware programs on the user's computer. All this can happen without the user knowing anything until the worm is established. Some worms do nothing but replicate themselves repeatedly, overloading the computer and network. Others will steal information, or open a back door for hackers to use.
5. Adware
As its name implies, this type of malware inundates the user with unwanted advertising. Adware programs can change the browser's homepage, bombard the screen with pop-up ads, as well as create spyware. Although this software may not sound as bad as other forms of malware, it can be extremely irritating and disruptive and is often capable of causing your device long-term problems. It is common for this malware to slow down or even crash your device. It can also use up your internet bandwidth. Adware is the name for this software when it infects a computer, but is known as malware when it's on a mobile device, such as a smartphone.
6. Ransomware
Ransomware is a particularly sinister form of malware that is used to extort money from users by criminals. It uses encryption to hold a user's data with the promise that the data will be restored upon payment of a ransom. Ransomware gets onto a computer by either fooling the user into installing it, or by making use of weaknesses in the device's security software. This type of malware can target not just individual users, but also high profile institutions such as hospitals, universities, and government agencies.
How to Avoid Malware Infections
Generally speaking, there are three approaches that you should take to minimize or prevent malware infections:
  1. Make sure that you have anti-malware security software installed on your computer, and that it is updated regularly.
  1. Make sure that you use secure passwords and that you change them regularly.
  1. Do not download programs or documents from untrustworthy sources. It is also wise to be wary of attachments and hyperlinks found in spam emails and instant messages.
 

No comments:

Post a Comment