Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Geek, I am your Father.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. MusicBee
4. Microsoft Visual C++ 2015-2022 Redistributable Package
5. Sergei Strelec's WinPE
6. HiBit Uninstaller
7. Visual C++ Redistributable Runtimes AIO Repack
8. Smart Defrag
9. ImgBurn
10. K-Lite Mega Codec Pack
More >>

top reads

Star 10 File Explorer Tips To Work Smarter

Star How To Disable (or Uninstall) OneDrive

Star Quick Machine Recovery Explained: What It Is and How To Enable It

Star How to Auto-Switch Between Light and Dark Mode With PowerToys

Star How To Automatically Lock Your PC in Windows 11

Star What To Do When Microsoft Flags Unusual Sign-in Activity on Your Account

Star How To Remove the Windows 11 Updated Start Menu

Star How To Disable Drag Tray

Star How To Permanently Delete Files Without Sending Them to the Recycle Bin in Windows 11

Star How To Repair Install Windows 11, and Keep All Your Files and Apps


MajorGeeks.Com » News » March 2015 » Malware 101

Malware 101


Posted by: Timothy Weaver on 03/30/2015 08:15 AM [ comments Comments ]


We use to be mostly concerned with viruses. But with the increase in malicious programs, they are now all uniformly referred to as malware.



So what constitutes malware:

Adware - Unsolicited software that shows advertisements or redirecting your browser to a specific website.

Browser Hijacks - Usually it directs you to a predetermined website. However, it can also direct you to a website that will download malware onto your computer.

Spyware - Just what it sounds like. It hides on your system and can track web activity, access emails and even steal username and password information.

Malware that causes damage to your system - It causes data corruption or will allow an attacker to take over the users’ computer.

Bots - Referred to as robots, it will sits hidden and turn your system into a "zombie" in order to carry out distributing spam, injecting adware onto other computers, recruiting other computers for Denial of Service (DoS) attacks and more.

Macro Viruses - Found in documents such as Word, Excel and Power Point files, the macro virus will not cause any harm to your computer until it is launched, which usually consists of just opening the document.

Ransomware - Just what it says, designed to hold your personal files ransomed. The attacker then demands payment in order for the user to receive the encryption key to unlock the data.

Rogueware/Scareware - This is malicious software that gets you to scan your system and then reports false positives and asks you to purchase additional software to remove the false positive. If a user clicks on that link it can then direct them to a compromised website, allowing for the injection of malware onto the computer.

Trojan Horses - Here are the most common trojan horses:
• Backdoor Trojan- These Trojans can create a “backdoor” on a users’ computer, allowing the attacker access to the machine in order to control it, upload stolen data and even download more malware onto the computer.
• Downloader Trojan- The main purpose of these Trojans are to download additional content onto the infected computer, such as additional pieces of malware.
• Infostealer Trojan- This Trojan’s main objective is to steal data from the infected computer.
• Remote Access Trojan- This Trojan is designed to give the attacker full control over the computer.
• Distributed Denial of Service (DDoS) Attack Trojan- This Trojan performs DDoS attacks, which are designed to take down a network by flooding it with traffic.

Worms - A computer worms’ main objective is to spread as many copies of itself in any way possible from computer to computer.

Source: Norton


« SSD-Z will provide details about your solid state drive · Malware 101 · Banking Fraud 101 »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2015 » Malware 101

© 2000-2026 MajorGeeks.com
Powered by Contentteller® Business Edition