Saturday, 30 January 2021

2 - Types of Maleware

 

Worms

 A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. It is a standalone malware computer program that replicates itself

Trojan Horse 

A Trojan horse (or simply trojan) is any malware which misleads users of its true intent. It is a type of malicious code or software that looks legitimate but can take control of your computer.

 

Spam:

Spam refers to unsolicited bulk messages being sent through email, instant messaging or other digital communication tools. It is generally used by advertisers. It's a malware carrier—Some spam carries email attachments that if opened can infect your computer with viruses or spyware.

 

Spyware:

Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users. Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans; examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons.

 

Zombie

 

A zombie is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan. It can be used remotely for malicious tasks. Most owners of zombie computers do not realize that their system is being used in this way, hence the comparison with the living dead.

 

Ransomware

Ransomware is malicious software that infects your computer by encrypt the victim's information or data and displays messages demanding a fee to be paid in order for your system to work again. This class of malware is a criminal moneymaking scheme that can be installed through deceptive links in an email message, instant message or website.

 

Cryptojackers

As cryptocurrencies become more popular,  they become increasingly expensive to mine. The problem is that mining for cryptocurrency is expensive because the process requires powerful computers, which consume a large amount of electricity. To avoid this expense, dishonest individuals, known as cryptojackers, set up websites that use a visiting computer's resources such as power, processor, and memory to mine cryptocurrencies in the background, without consent.

Cryptojacking is the process of accessing a computer's resources through the website it is visiting to mine cryptocurrency without the consent or knowledge of the person using the computer.

The website hijacks the computer's power, including CPU and memory, to help it complete complex tasks which, in turn, earns the cryptojackers digital coins.

 

Adware

Adware (or advertising software) is the term used for various pop-up advertisements that show up on your computer or mobile device. Adware has the potential to become malicious and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.


No comments:

Post a Comment