Skip to main content

What is Malware?

What is Malware?


Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.


Few are listed Below


A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. It infect other computer without the permission or knowledge of the user. Virus may corrupt the system or can steal any data.


A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. 


A backdoor is a computer program that allows an attacker to gain unauthorized remote access to a victim's machine often without their knowledge.


A Trojan horse is any malware that misleads users of its true intent. Once installed, Trojans may perform a range of malicious actions, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.


Ransomware is a type of malware that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. As the name specifies the victim has to give some ransom means huge amount.


Spyware is tool that installs in the computer/device by itself and can start monitoring the actions or behavior of the user without the knowledge of the user. It secretly gathers the information of the user or organization.


Keyloggers are a kind of spyware are installed in the users system without being noticed. Hackers use them to maliciously gain access to the victims system that comprises of phone, cctv, or even computer system. Cybercriminals use keyloggers to steal credentials, bank login information, social media login information and personal information.


Mobile Malware as the name suggests these are malicious piece of code that targets mobile devices for the leakage of information or any misuse of the contact for there own benefit.

Comments

Popular posts from this blog

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it . Social engineering is a term we are hearing now a days a  lot. But  what is it?  Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions. Lets see few techniques with examples below Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person. Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number. Vishing also known as " voice phishing ", is again the same practice of revealing the information over a ...

What are SSL and TLS?? What is the difference between SSL and TLS??

What are SSL and TLS?? What is the difference between SSL and TLS?? What is SSL? SSL (Secure Sockets Layer) is networking protocols which helps in securing the network. Transport Layer Security (TLS)  is the upgrade version of SSL. SSL is a digital document that secure the identity of any website. Basically it encrypts the data by using cryptographic key pairs which consists of public and private key. The public key is present in the certificate and allows the web browser to start off the communication given to the server. The private key is on the server and is used to digitally retrieve or sign the web pages and other files such as images, videos, scripting files. In SSL certificate we can see much information also which includes identifying information about the website, its domain name and identifying information about the site's owner. We could also see expiry information, serial number, company issued also about the certificates. To keep the website secure one should buy the...