Malware: What it Means, Common Types
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware," which is a good way to remember it (even if you're not Spanish).
Common examples of malware include viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers. Distinctive sorts of malware
Common Types of Malware:
· Virus: Infects program documents or potentially individual records
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware," which is a good way to remember it (even if you're not Spanish).
Common examples of malware include viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers. Distinctive sorts of malware
Common Types of Malware:
· Virus: Infects program documents or potentially individual records
· Spyware: Software that gathers individual data
· Worm: Malware that can recreate itself over a system
· Trojan: Malware that looks, and may even work, as a honest to goodness program
· Browser hijacker: Software that changes your web program
· Rootkit: Software that increases regulatory rights for vindictive plan
· Key logger: The key-logger often has the ability to sit between the keyboard and the operating system and intercept all of the communications without the user’s knowledge.
· Worm: Malware that can recreate itself over a system
· Trojan: Malware that looks, and may even work, as a honest to goodness program
· Browser hijacker: Software that changes your web program
· Rootkit: Software that increases regulatory rights for vindictive plan
· Key logger: The key-logger often has the ability to sit between the keyboard and the operating system and intercept all of the communications without the user’s knowledge.
· Ransomware: Ransomware is malicious code that is used by cyber criminals to launch data kidnapping and lock-screen attacks.
#PUP #PUA #Adware #Rogue— Raby (@raby_mr) March 4, 2019
InfoPure 2010 Korean Rogue
VT Link : https://t.co/cSeF2cBUVx pic.twitter.com/jBYSEDEPrC
1 comment:
INFO SECURE
Post a Comment