Malware is defined as any initial activity within a computer that cause a risk to the integrity of the computer. The term malware was first used in 1995, and is based on the reverse engineering technique, where a hacker will try to decipher software coding to discover its vulnerabilities.
Basically, it can corrupt or delete data, or even make your computer inoperable. But it is possible to prevent such things from happening if you have the appropriate software in place. The term malware is short for malicious software.
Different Types of Malware
There are a variety of malware which serve different purposes. Here are some of them:
Trojan horse – This is a term that is used to describe potentially dangerous programs. They are programs that are hidden inside seemingly innocuous programs. They can appear to be safe programs but are actually colonial devices. The term comes from a time of war where soldiers would open boxes and utilize whatever was inside them. Trojan horses can be made to appear palatable by having a programmer disguise their contents. They can appear to be harmless but are actually harboring programs which would like to crash your computer.
Virus – A virus is a self-replicating software program that can infect other computers, either through a worm or a Trojan Horse. They are fashioned to damage the computers that they infect. The term comes from Greek, meaning damage, as the virus makes copies of itself and damages the computers it has infected.
Spyware – Software that is installed onto a computer in order to steal information about the user. This can be in the form of activities such as installing themselves on the computer, running in the background, and copying data from the computer. Spyware is an absolute nuisance but is actually perfectly legal. It is installed with the user’s explicit consent. Once installed, it tracks the user’s usage and sends that information back to the software manufacturer.
What is Malware?
To define malware, it is software that does malicious things. It is intended to damage the host’s computer, and perhaps network resources, too. How do they do that? Malware spreads through two channels:
It is when malware is installed into your computer that it can do damage to your host’s computer. When compromised, your computer becomes a zombieserver. Meaning, it becomes a member of a network and takes on the characteristics of that network. This can be anything from a mailbox hijacker to a spammer. You can see all of the activity on the network and target of all the activities generated on your computer.
This is an example of malware entering your system as a website. At installation, it appears as a website that you trust, so you enter your trust name and your website address. It looks like a legitimate site and you enter all of your personal information. The worst part is that this site could be set up to steal your personal information if you’re not careful. Once you’re all done giving them your information, they can then target you permanently. What crime can you commit that they will not be able to laid bare?
Use common sense when looking at these sites. If you’re not sure that it’s a scam, then don’t do anything. Ever. If you are scammed, report it to the BBB at once so that they have a chance to investigate it.
That’s all you can do to protect yourself from these types of sites. For more information on how to report scams and phishing go toFakeMoney.org.