Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
Few are listed Below
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. It infect other computer without the permission or knowledge of the user. Virus may corrupt the system or can steal any data.
A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.
A backdoor is a computer program that allows an attacker to gain unauthorized remote access to a victim's machine often without their knowledge.
A Trojan horse is any malware that misleads users of its true intent. Once installed, Trojans may perform a range of malicious actions, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Ransomware is a type of malware that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. As the name specifies the victim has to give some ransom means huge amount.
Spyware is tool that installs in the computer/device by itself and can start monitoring the actions or behavior of the user without the knowledge of the user. It secretly gathers the information of the user or organization.
Keyloggers are a kind of spyware are installed in the users system without being noticed. Hackers use them to maliciously gain access to the victims system that comprises of phone, cctv, or even computer system. Cybercriminals use keyloggers to steal credentials, bank login information, social media login information and personal information.
Mobile Malware as the name suggests these are malicious piece of code that targets mobile devices for the leakage of information or any misuse of the contact for there own benefit.
Comments
Post a Comment