Ransomware
This is becoming more and more popular these days. Infection usually spread via email attachments or malicious urls which triggers a download. Commonly, ransomware encrypts data files on a computer and only way to decrypt your file is to pay the ransom to the attacker through crypto currency. That too within a very short period of time. If not paid, your files are deleted.
Rootkits
Rootkits are malware that hides inside the computer's operating system. It remains concealed and avoids easy detection. You will not even know when the harm was done.
Botnets
Botnet is a collection of software robots (generally known as bots) that together creates and army of infected computers (generally known as zombies) that are remotely controlled by the attacker. Botnet is typically used to execute denial-of-service attack (Dos attack) or distributed denial-of-service (DDoS attack). You may even not know when your computer was a part of bots.
Viruses
These are most common types of malware and does many damaging things to your computer. Delivery is mostly through email attachments or download triggered by click on malicious link. It propagates by making copies of themselves. When infected program is executed, the virus attempts to replicate itself by copying itself into other programs while doing the intended jobs.
Worms
Unlike virus, worms goes to work on its own without attaching itself to a program or files. Worms live in a computer's memory and can propagate by sending themselves to other computers in a network or across the internet by itself. They can quickly infect large numbers of computers and may cause a firm's network to be overwhelmed with traffic and slow down or stop working all together.
Trojans
If you've watch the movie "Troy" you already know what trojan is. It is a malicious program disguised as a legitimate-looking software. You fall a victim to this program when you download games, screensavers, rogue security software etc. After installation Trojan will auto run in background. These are mostly used to create a backdoor to a computer to exfiltrate sensitive information.
This is becoming more and more popular these days. Infection usually spread via email attachments or malicious urls which triggers a download. Commonly, ransomware encrypts data files on a computer and only way to decrypt your file is to pay the ransom to the attacker through crypto currency. That too within a very short period of time. If not paid, your files are deleted.
Rootkits
Rootkits are malware that hides inside the computer's operating system. It remains concealed and avoids easy detection. You will not even know when the harm was done.
Botnets
Botnet is a collection of software robots (generally known as bots) that together creates and army of infected computers (generally known as zombies) that are remotely controlled by the attacker. Botnet is typically used to execute denial-of-service attack (Dos attack) or distributed denial-of-service (DDoS attack). You may even not know when your computer was a part of bots.
Viruses
These are most common types of malware and does many damaging things to your computer. Delivery is mostly through email attachments or download triggered by click on malicious link. It propagates by making copies of themselves. When infected program is executed, the virus attempts to replicate itself by copying itself into other programs while doing the intended jobs.
Worms
Unlike virus, worms goes to work on its own without attaching itself to a program or files. Worms live in a computer's memory and can propagate by sending themselves to other computers in a network or across the internet by itself. They can quickly infect large numbers of computers and may cause a firm's network to be overwhelmed with traffic and slow down or stop working all together.
Trojans
If you've watch the movie "Troy" you already know what trojan is. It is a malicious program disguised as a legitimate-looking software. You fall a victim to this program when you download games, screensavers, rogue security software etc. After installation Trojan will auto run in background. These are mostly used to create a backdoor to a computer to exfiltrate sensitive information.
No comments:
Post a Comment