Wednesday 13 July 2016

All About Malwares


According to Wikipedia, Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.Malicious software was called computer virus before the term malware was coined in 1990 by Yisrael Radai.
Malwares are generally used for stealing accounts, passwords and confidential data. Malwares are very dangerous if they get install in our computers or cell phones. Malware can open a backdoor if they enter in our Computer and then an attacker might able to steal confidential information and can do whatever he want.
He can even turn on our webcam or can access to any file or folder.

Generally, malware gets install on our computer or cell phones if we click on any malicious link which redirects us to a malicious website and the malware automatically gets install in our devices.
Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics. An example of such software, which was described as illegitimate, is the Sony rootkit, a Trojan embedded into CDs sold by Sony, which silently installed and concealed itself on purchasers' computers with the intention of preventing illicit copying; it also reported on users' listening habits, and unintentionally created vulnerabilities that were exploited by unrelated malware.


DIFFERENT TYPES OF MALWARE

    1. Adware:. The least dangerous and most lucrative Malware. Adware displays ads on your computer.
    2. Spyware:. Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system.
    3. Virus: A virus is a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.
    4. Worm: A program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty.
    5. Trojan: The most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ” Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
    6. Rootkit: This one is likened to the burglar hiding in the attic, waiting to take from you while you are not home. It is the hardest of all Malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything from scratch. It is designed to permit the other information gathering Malware in to get the identity information from your computer without you realizing anything is going on.
    7. Backdoors: Backdoors are much the same as Trojans or worms, except that they open a “backdoor” onto a computer, providing a network connection for hackers or other Malware to enter or for viruses or SPAM to be sent.
    8. Keyloggers: Records everything you type on your PC in order to glean your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program. Many times keyloggers are used by corporations and parents to acquire computer usage information.  
    9. Rogue security software: This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010
    10. Ransomware: If you see this screen that warns you that you have been locked out of your computer until you pay for your cybercrimes. Your system is severely infected with a form of Malware called Ransomware. It is not a real notification from the FBI, but, rather an infection of the system itself. Even if you pay to unlock the system, the system is unlocked, but you are not free of it locking you out again. The request for money, usually in the hundreds of dollars is completely fake.
    11. Browser Hijacker:  When your homepage changes to one that looks like those in the images inserted next, you may have been infected with one form or another of a Browser Hijacker. This dangerous Malware will redirect your normal search activity and give you the results the developers want you to see. Its intention is to make money off your web surfing. Using this homepage and not removing the Malware lets the source developers capture your surfing interests. This is especially dangerous when banking or shopping online. These homepages can look harmless, but in every case they allow other more infectious 





How to stay safe from malware

Here are the tips to stay safe from malware:

  1. Install Antivirus/malware software
  2. Keep your software up-to-date
  3. Keep your OS up-to-date
  4. Run scan regularly
  5. Secure your browsing via web antiviruses.
  6. Do not click on links or sites which you don't trust
  7. Do not use Public Wifi
  8. Backup your files
  9. Use strong passwords


HOPE YOU LIKE THIS ARTICLE, SHARE WITH YOUR FRIENDS USING SHARE BUTTONS BELOW. :)



2 comments:

  1. hi, am jessica, i had my friend help me hack my ex's email, facebook, whatsapp,and his phone cause i suspected he was cheating. all he asked for was a his phone number. he's email is cyberlaser1477@gmail.com..IF u need help tell him jessica referred you to him and he'll help. Am sure his going to help you do it, good luck

    ReplyDelete
  2. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete