WHAT IS MALWARE ?
Malware is a special malicious that is created to harm the computer or used to compromise computer functions, stealing confidential, bypassing access controls. Malware is a broad term that refers to a variety of malicious programs.
TYPES OF MALWARE:
ADWARE: Adware automatically distributes advertisements. Examples of it include pop-up ads on websites and advertisements that are displayed by device software. Often it comes with free versions software. Others are sponsored or authored by advertisers and servers which generate revenue . While it only delivers ads , it is not uncommon it is bundled with spyware but it happens it is significantly more dangerous than adware on its own.
BOTS: It automatically performs specific operations. Bots can assign your device control to third parties through botnets that can perform DDoS attacks, show advertisements on websites, can scrape server data and it mostly found on free download sites .
BUG:A bug is a mistake produces an unwanted outcome. It is mostly the result of human error and typically exist in the source code or compilers of a program. Minor bugs hardly effect device and sometimes unnoticeable for years but significant bugs can do crashing or freezing. Security bugs allow attackers to bypass user authentication, override access privileges. Bugs can be stopped with developer education, quality control, and with code analyzing tools.
RANSOMWARE: It lockup device and demand a ransom. It controls user access to the device either by encrypting files on the HDD or locking down the system and showing alerts that are planned to push the user to pay the creator to eliminate the restrictions and regain access to their computer. Ransomware spreads like a worm , access system with downloaded file or vulnerability in a network service
ROOTKIT: It is designed to remotely access device without being detected by security programs. Once installed it can remotely install files, get information, modify system configurations, alter security software, install concealed malware, or control the computer like a botnet. Rootkit it difficult to find because it continually hides its presence.
It can be detected by manual methods by monitoring computer behaviors . Organizations should regularly patch their vulnerabilities and avoid suspicious downloads.
SPYWARE: It just spies user activities. It has capabilities like monitoring, collecting keystrokes etc. Spyware often has extra capabilities as well, starting from modifying browsers to snooping with network connections.
TROJAN HORSE: Trojan horse trick users into downloading and installing malware. IT can be full of malicious party remote access to an infected computer. Once a hacker has access to an infected computer, it can perform any task according to the of Trojan horse.
VIRUS: It is capable of copying itself and spreading to other devices. It often spread to other devices by attaching themselves to programs and executing code when a user launches .They can spread through coded files, documents, and cross-site ing vulnerabilities in web apps. It can also steal information, harm main computers and networks, create botnets, steal money, render advertisements, and much more.
WORM: They spread over computer networks by abusing OS vulnerabilities. It usually causes harm to their main server strength by consuming bandwidth and overloading web servers. It can also contain payloads that harm host computers. Payloads are pieces of code made for the specific task. Payloads are usually planned to steal data, delete files, or create botnets. It can be compared with the virus but t worms have the ability to self-replicate and spread self-reliant while viruses depend on human activity to the blow-out. Worms often blow-out by sending mass emails with malicious attachments to users’ contacts.
SPAM:Spam is the unwanted messages its common medium is email, but it can come by instant messages, texting, blogs, web forums, search engines, and social media. It is not malware but malware spread through spamming . Users can inhibit getting spammed by avoiding unaccustomed emails and keeping their email addresses as private as possible.