Malware is the collective term to describe malicious programs, incuding viruses, trojans, spyware, adware,rootkits, nerbots, backdoors, keyloogers, fraudulent dialers, the list is endless. Some of the other threats include phising and pharming.
VIRUS: It is a program that can replicate itself and affect normal operation of a computer without the permission or knowledge of the user.
POLMORPHiC VIRUS: This type of a virus keeps changing its signature every time it replicates and infects a new file.
WORM: Unlike a virus, a worm is a program that is capable of replicating and spreading to various other systems without the need of a host file.
TROJAN: It is a program that contains or installs a malicious program though it appears to be a genuine one.
SPYWARE: Such type of software collects personal information about the users without their informed consent.
ADWARE: These software are capable of playing, displaying, or downloading advertising material automatically to a computer after it is installed on it.
BACKDOOR: It is a program that can bypass normal authentication to gain remote access to a computer and remain hidden from cursory inspection.
BOTNET: It is a network of computers controlled by a Bot developer.
ROOTKIT: These software tools hide some malicious running processes, files or system data from the operating system.
KEY-LOGGER: It is a program that is used to capture the user's keystrokes.
FRAUDULENT DIALERS: It is a program that that installs a malicious program.
PHISHING: It is a fake website appearing to be a genuine one in orderto extract personal details from users.
PHARMING: Pharming is aimed to redirect website's traffic to another phoney website.
VIRUS: It is a program that can replicate itself and affect normal operation of a computer without the permission or knowledge of the user.
POLMORPHiC VIRUS: This type of a virus keeps changing its signature every time it replicates and infects a new file.
WORM: Unlike a virus, a worm is a program that is capable of replicating and spreading to various other systems without the need of a host file.
TROJAN: It is a program that contains or installs a malicious program though it appears to be a genuine one.
SPYWARE: Such type of software collects personal information about the users without their informed consent.
ADWARE: These software are capable of playing, displaying, or downloading advertising material automatically to a computer after it is installed on it.
BACKDOOR: It is a program that can bypass normal authentication to gain remote access to a computer and remain hidden from cursory inspection.
BOTNET: It is a network of computers controlled by a Bot developer.
ROOTKIT: These software tools hide some malicious running processes, files or system data from the operating system.
KEY-LOGGER: It is a program that is used to capture the user's keystrokes.
FRAUDULENT DIALERS: It is a program that that installs a malicious program.
PHISHING: It is a fake website appearing to be a genuine one in orderto extract personal details from users.
PHARMING: Pharming is aimed to redirect website's traffic to another phoney website.
0 comments:
Post a Comment