Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - If you thought our name was dumb, look at this slogan we got.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. MusicBee
5. Sergei Strelec's WinPE
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Visual C++ Redistributable Runtimes AIO Repack
8. McAfee Removal Tool (MCPR)
9. K-Lite Mega Codec Pack
10. Tweaking.com - Windows Repair
More >>

top reads

Star All the New Features Landing in Windows 11 This December

Star Lossless vs Lossy: When FLAC, APE, and ALAC Beat MP3 and When They Don't

Star Google Search Tricks You'll Actually Use in 2025 and Beyond

Star Fresh PC Checklist: First 12 Things to Do On a New Windows 11 Machine

Star Running AI Models Locally: What They Are, Where to Find Them, and How to Get Started

Star Deciding Between Idle State, Sleep Mode, and Shutdown: What's Best for Your PC?

Star How to Fix VMware Workstation "The Update Server Could Not Be Resolved" Error Installing VMware Tools

Star How to Remove Google Gemini from Your Phone (and Your Life)

Star Windows Bloat Removal Guide: Debloat Safely and Keep What You Need

Star Windows 11 Repair Playbook: SFC, DISM, CHKDSK Without Breaking Stuff


MajorGeeks.Com » News » March 2015 » Malware 101

Malware 101


Posted by: Timothy Weaver on 03/30/2015 08:15 AM [ comments Comments ]


We use to be mostly concerned with viruses. But with the increase in malicious programs, they are now all uniformly referred to as malware.



So what constitutes malware:

Adware - Unsolicited software that shows advertisements or redirecting your browser to a specific website.

Browser Hijacks - Usually it directs you to a predetermined website. However, it can also direct you to a website that will download malware onto your computer.

Spyware - Just what it sounds like. It hides on your system and can track web activity, access emails and even steal username and password information.

Malware that causes damage to your system - It causes data corruption or will allow an attacker to take over the users’ computer.

Bots - Referred to as robots, it will sits hidden and turn your system into a "zombie" in order to carry out distributing spam, injecting adware onto other computers, recruiting other computers for Denial of Service (DoS) attacks and more.

Macro Viruses - Found in documents such as Word, Excel and Power Point files, the macro virus will not cause any harm to your computer until it is launched, which usually consists of just opening the document.

Ransomware - Just what it says, designed to hold your personal files ransomed. The attacker then demands payment in order for the user to receive the encryption key to unlock the data.

Rogueware/Scareware - This is malicious software that gets you to scan your system and then reports false positives and asks you to purchase additional software to remove the false positive. If a user clicks on that link it can then direct them to a compromised website, allowing for the injection of malware onto the computer.

Trojan Horses - Here are the most common trojan horses:
• Backdoor Trojan- These Trojans can create a “backdoor” on a users’ computer, allowing the attacker access to the machine in order to control it, upload stolen data and even download more malware onto the computer.
• Downloader Trojan- The main purpose of these Trojans are to download additional content onto the infected computer, such as additional pieces of malware.
• Infostealer Trojan- This Trojan’s main objective is to steal data from the infected computer.
• Remote Access Trojan- This Trojan is designed to give the attacker full control over the computer.
• Distributed Denial of Service (DDoS) Attack Trojan- This Trojan performs DDoS attacks, which are designed to take down a network by flooding it with traffic.

Worms - A computer worms’ main objective is to spread as many copies of itself in any way possible from computer to computer.

Source: Norton


« SSD-Z will provide details about your solid state drive · Malware 101 · Banking Fraud 101 »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2015 » Malware 101

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition