Malware is also known as malicious software. A software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.
How Malware Spreads?
Malware is a program that must be triggered or somehow executed before it can infect your computer system and spread to others.
Here are some examples on how malware is distributed:
- Social network
- Pirated software
- Removable media
- Emails
- Websites
Damages
1. Data Loss
Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files.
2. Account Theft
Many types of malware include key logger functions, designed to steal accounts and passwords from their targets. This can give the malware author access to any of the user’s online accounts, including email servers from which the hacker can launch new attacks.
3. Botnets
Many types of malware also subvert control over the user’s computer, turning it into a “bot” or “zombie.” Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails.
4. Financial Losses
If a hacker gains access to a credit card or bank account via a keylogger, he can then use that information to run up charges or drain the account. Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user’s system for a full month may gain access to the user’s entire financial portfolio, allowing him to do as much damage as possible in a single attack.
Symptoms that your computer is affected:
- Increased CPU usage
- Slow computer or web browser speeds
- Problems connecting to networks
- Freezing or crashing
- Modified or deleted files
- Appearance of strange files, programs, or desktop icons
- Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs).
- There seems to be a lot of network activity when you are not using the network
Types of malware:
- Viruses
- Trojan horses
- Ransomware
- Spam
- Adware
- Spyware
- Worms
- Zombie
Viruses:
A program of code which is loaded on your computer without your knowledge . All viruses are manmade. viruses copy themselves to other disk to spread to other computers.
Trojan horse:
A Trojan horse must be send by someone or carried by another program or software of some sort. they are used to capture your login or password.
Ransomware:
Ransomware is a form of malware essentially holds a computer system captive while demanding a ransom. The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer.
Spam:
Spam is email that you did not request and do not want. One person’s spam is another’s useful newsletter or sale ad. Spam is a common way to spread viruses , Trojans etc….
Spyware:
Spyware is a type of malware installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else.
Adware:
Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. Often times software and applications offer “free” versions that come bundled with adware.
Worms:
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.
Zombie:
Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities.
How Can You Protect Your Computer?
•Install protection software.
•Practice caution when working with files from unknown or question able sources.
•Do not open e-mail if you do not recognize the sender.
•Download files only from reputable Internet sites.
•Install firewall.
•Scan your hard drive for viruses monthly.