Know the Different Types of Malware
Many end up making a big mess when it comes to defining what is malware, what is the difference between it and a virus or adware, among other questions.
So we decided to bring this article, explaining the main types of malware the difference between them, check it out!
Types of Malware - Viruses, Worms, Adware, Spyware ...
First, you need to know the correct definition of malware!
Malware is defined as any type of malicious program that can infect your computer or smartphone, so viruses are one type of malware, spyware is another type of malware, and so on.
Now understand the difference between them and what each one can cause in your equipment!
1. Virus
Viruses are certainly the most popular type of malware and even today the term "virus" is used by the majority for all types of existing malware, where users summarize any type of infection as "my computer has a virus".
The “virus” type of malware gained its name for its ability to spread and infect various files on the computer, which could extend the infection to other equipment.
They can do this by sending emails with infected files or using removable media, formerly with diskettes, and nowadays with a Pen Drive or External HD.
Read our tutorial: How to protect your Pen Drive against viruses
The first computer virus was called "Brain" and was developed in 1986, oddly enough to combat piracy.
Two brothers were having problems with users pirating the software of your store programmed the virus to be downloaded and activated at the time the disk containing the software was copied.
The virus reached the boot sector of the equipment and failed to load the operating system.
2. Worms
The malware type worms are known for the ability to spread without help.
After infecting the equipment, worms use security flaws in the local network to infect other computers and also use flaws in e-mail programs to send thousands of copies to infect new users.
Some only use system resources, but some variants can offer great danger to steal and/or delete information from the equipment.
3. Adware
The adware is perhaps one of the types of malware most hated.
They are responsible for displaying excessive advertisements on the equipment, whether while browsing the internet or even in the common use of the computer.
Related content: How to remove advertisements from the browser
The adware usually installs itself with the "permission" of the user during the installation of some inattentive popular program.
When you click "Next> I accept> Next> Finish" without reading what is written and without un-marking the installation of additional programs, you end up infecting your computer with some type of adware.
4. Spyware
Spyware, as the name suggests, is a spy.
You can monitor what you type on your keyboard, browsed websites and information about logins (username and password), and send this data to cybercriminals.
This information can be used by criminals to steal valuables, practice extortion, and other types of cybercrime.
5. Ransomware
The ransomware is much feared, it is a kidnapper file.
After infecting the equipment, it encrypts the information and literally requests a ransom payment, usually asking for values between the US $ 500.00 and the US $ 2,000.00.
As this payment is made via Bitcoin (virtual currency), tracking this payment and identifying the author becomes very difficult.
Security companies do not recommend payment.
On the company page, a great number of free tools are offered to remove the infection and unlock the files.
6. Bots
The bots are programmed to perform specific actions on an infected computer.
Generally, malicious hackers use various infected equipment to command large-scale attacks, such as DDoS.
7. Rootkits
The rootkits are malware known for their ability to hide protection programs.
They are used to provide remote access to the equipment, serving to steal information or to propagate other types of malware.
8. Trojan (Trojan Horse)
A trojan, known in Brazil as a Trojan horse, after infecting the equipment it camouflages itself as if it were a harmless program or file (that is the origin of the name).
It does not spread, the intention is always to go unnoticed.
While it remains on the equipment, it collects information and security holes, which can be used for various malicious purposes.
Comments
Post a Comment