Malware
Malware is short for Malicious Software. Malware is a term that refers to many different form of invasive software. Types of malware include:
Pharming
The practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information.
Viruses
A piece of code which is capable of copying itself and usually has a harmful effect, such as corrupting the system or destroying data.
Worms
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
Trojans
One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
Spyware
Spyware is software that enables a user to obtain secret information about another person's computer activities by transmitting data covertly from their hard drive.
Adware
Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is
online.
What Hackers Can Do With Malware
Computer hackers are unauthorised users who break into computer systems in order to steal, change or destroy information. They have the ability to track your location, steal your money and information. They even have the ability to search through your documents and access your webcam!
How To Prevent Being Affected By Malware
Use firewall, antivirus, anti-malware, and anti-exploit technology. Your firewall and antivirus programs will detect and block the known bad guys. Meanwhile, your anti-malware and anti-exploit software can fend off sophisticated attacks from unknown people that could be hackers. Also make sure your privacy settings are on on your social media profiles as your information can be accesses via that.
Example
Cyptolocker was a Trojan ransom-ware that conned over 27 million dollars out of computers running Microsoft Windows from 5 September 2013 to late-May 2014, and was believed to have first been posted to the Internet on 5 September 2013. It spread via infected email attachments, and via an existing botnet; when activated, the malware codes certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the decoder stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) is made by a stated deadline.
Hello scarlett Im james
ReplyDeleteJaiC
DeleteDo you know da wae my bruddah
ReplyDeleteDo you know da wae my bruddah
ReplyDeleteDo you know da wae my bruddah
ReplyDeleteDo you know da wae my bruddah
ReplyDeleteDo you know da wae my bruddah
ReplyDeleteShow me da wae
ReplyDelete