Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

Just when you thought things couldn't get Geekier - MajorGeeks.Com.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » March 2015 » Malware 101

Malware 101


Posted by: Timothy Weaver on 03/30/2015 08:15 AM [ comments Comments ]


We use to be mostly concerned with viruses. But with the increase in malicious programs, they are now all uniformly referred to as malware.



So what constitutes malware:

Adware - Unsolicited software that shows advertisements or redirecting your browser to a specific website.

Browser Hijacks - Usually it directs you to a predetermined website. However, it can also direct you to a website that will download malware onto your computer.

Spyware - Just what it sounds like. It hides on your system and can track web activity, access emails and even steal username and password information.

Malware that causes damage to your system - It causes data corruption or will allow an attacker to take over the users’ computer.

Bots - Referred to as robots, it will sits hidden and turn your system into a "zombie" in order to carry out distributing spam, injecting adware onto other computers, recruiting other computers for Denial of Service (DoS) attacks and more.

Macro Viruses - Found in documents such as Word, Excel and Power Point files, the macro virus will not cause any harm to your computer until it is launched, which usually consists of just opening the document.

Ransomware - Just what it says, designed to hold your personal files ransomed. The attacker then demands payment in order for the user to receive the encryption key to unlock the data.

Rogueware/Scareware - This is malicious software that gets you to scan your system and then reports false positives and asks you to purchase additional software to remove the false positive. If a user clicks on that link it can then direct them to a compromised website, allowing for the injection of malware onto the computer.

Trojan Horses - Here are the most common trojan horses:
• Backdoor Trojan- These Trojans can create a “backdoor” on a users’ computer, allowing the attacker access to the machine in order to control it, upload stolen data and even download more malware onto the computer.
• Downloader Trojan- The main purpose of these Trojans are to download additional content onto the infected computer, such as additional pieces of malware.
• Infostealer Trojan- This Trojan’s main objective is to steal data from the infected computer.
• Remote Access Trojan- This Trojan is designed to give the attacker full control over the computer.
• Distributed Denial of Service (DDoS) Attack Trojan- This Trojan performs DDoS attacks, which are designed to take down a network by flooding it with traffic.

Worms - A computer worms’ main objective is to spread as many copies of itself in any way possible from computer to computer.

Source: Norton


« SSD-Z will provide details about your solid state drive · Malware 101 · Banking Fraud 101 »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2015 » Malware 101

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition