Story Pitch

My story will be about Tig’s Smok’n Pig BBQ food truck and how they are staying afloat during the global pandemic. Food trucks depend on summer with the fairs and large social gathering that bring…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Types of malware

Malware is also known as malicious software that intentionally designed to damage your computer. There are many types of malware available and each has it’s different mechanism of compromising or damaging the user’s computer system. Here are some commonly well known types of malware.

Virus: A malicious program designed to replicate itself. This type of malware are typically attached to legitimate files, like document or software program. Not all viruses are intended to harm your computer, sometimes they could be pranks, USB infections runs when USB plugged-in, advertisements, random pop-ups and many more. In contrast some viruses are written by attackers trying to abuse the system vulnerability or damage your computer. There are many more different types of viruses boot-sector viruses, macro viruses, armored viruses, polymorphic viruses, retro viruses and so on.

Ransomware: Ransomware is type of malware designed to encrypt your computer or data until a ransom/money is paid. This type of malware restrict the use of computer data and make it hard access any documents or programs.

Crypto-malware: It’s a type of ransomware that uses encryption to block access to data using sophisticated cryptographic hash functions, so files could not be decrypted without unique key. These types of malware been used to mine crypto currency, crypto exchange and Cryptojacking.

Adware: This type of malware whose primary purpose is to display ads on your computer or browser.

Trojan horse: Trojan is a malicious application that misleads users. Trojans are often hidden in installer and act as a part of legitimate program. This type of malware often used to install backdoors on a computer, providing attacker remote access.

Backdoor: Backdoor is a type of malware that provides a secret way to gain access to a computer. This type of malware often used for securing remote access to a computer or gaining access to a system.

RAT: A remote access Trojan (RAT) is a type of malware designed to create a backdoor and provide full administrative control to a computer. This type of malware can take screenshot, access your microphone and your files in your computer without knowing the users. RATs can be packaged with legitimate downloads (such as, trial programs) and gain access to a computer without a user knowing about it.

Rootkit: This type of malware is designed to enable attackers to connect and control compromised computer remotely. Rootkit often gives full administrator access of the computer.

Worm: Worm is a type of malware whose sole purposes is to spread. Sometimes, worms don’t cause any damage to a computer or data. But nowadays a worm is often used with malicious payload which could contain ransomware, trojan or RAT because of it’s ability to rapidly spread across the system and network.

Keylogger: A Keylogger secretly captures all the keys pressed on the keyboard and either sends them to a remote server or records them to a file for later use by attacker.

Spyware: This type of malware whose primary purpose is to steal sensitive information from a computer. Including intercepting keyboard keystrokes, hijacking microphones or webcams, or directly stealing user data. Some spyware specifically used by attacker to gain banking information such as credit card details and usernames and passwords.

Bots: Bots are normally used to automate manual tasks, on applications, websites or system. There are two types of bots good bots and bad bots. Good bots are used to automate processes in a system or infrastructure whereas bad bots are often part of command and control servers and wait for further instructions or payload. Bots are also part of botnet where different bots are connected to command and control infrastructure and mostly used to perform denial-of-service (DoS) attacks.

Logic bomb: Logic bomb is a designed to create destruction on victims system on specific date and time or when the situation is met. These types of bombs are often deleting user data or making application offline.

Add a comment

Related posts:

Success Stories at the EGLAVATOR

We have many success stories for EGLA CORP to share.. I can share that I worked a lot in 2021 and will be working more in 2022. There is no difference on what is being accomplished specially with…

How To Make Money On Pinterest!!

Pinterest has become a popular platform for businesses and individuals to promote their products and services. With over 250 million monthly active users, it’s no wonder that many people are looking…

Losing Builds Character

Our country is hurting. It appears many Americans haven’t mastered the art of benefiting from winning OR losing. There is no record of the admired and award winning actor Billy Dee Williams as having…