Skip to main content

MOST DMAGING MALWARE

All malware is bad, but some types of malware do more damage than others. That damage can range from loss of files to total loss of security — even outright identity theft.




 

  • Overwriting Viruses.

 Some viruses deliver a payload that causes certain types of files to be deleted — sometimes even the entire drive contents. But as bad as that sounds, if you act quickly the odds are good you'll recover the deleted files. Overwriting viruses, however, write over the original file with their own information. Because the file has been modified or replaced, it can't be recovered. Overwriting viruses tend to be rare; their own damage is responsible for their shorter lifespan. Loveletter is one of the better-known examples of malware that included an overwriting payload.​

 

  •  Ransomware trojans encrypt data files on the infected system, then demand money from the victims in exchange for the decryption key. This type of malware adds insult to injury — not only do you lose access to your own important files, but you also become victim to extortion. Pgpcoder is perhaps the best-known example of a ransomware Trojan.

 

 

  • Password Stealers.

Password-stealing Trojans harvest login credentials for systems, networks, FTP accounts, email, games, as well as banking and e-commerce sites. Many password stealers can be repeatedly custom-configured by attackers after they've infected the system. For example, the same password-stealing Trojan infection could first harvest login details for email and FTP, then a new config file sent to the system which causes it to turn attention to harvesting login credentials from online banking sites. Password stealers that target online games are perhaps the most commonly talked about, but by no means are games the most common target.

 

 

  • Keyloggers

 


In its simplest form, a keylogger Trojan monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software — the type parents might use to record their children's online activities or a suspicious spouse might install to keep tabs on his or her partner.

Keyloggers may record all keystrokes, or they may be sophisticated enough to monitor for a specific activity like opening a web browser pointing to your online banking site. When the desired behavior is observed, the keylogger goes into record mode, capturing your login username and password.


  • Backdoors

 Backdoor Trojans provide remote, surreptitious access to infected systems. Put another way, it's the virtual equivalent of having the attacker sitting at your keyboard. A backdoor Trojan can allow the attacker to take any action you, as the logged-in user, would normally be able to take. Using this backdoor, the attacker can also upload and install additional malware, including password stealers and keyloggers.

 

 

  • Rootkits

 

 

While thought to be more theory than practice, this form of hardware targeting malware is perhaps the most concerning. Bootkits infect flash BIOS, causing the malware to be loaded even prior to the OS. Combined with rootkit functionality, the hybrid bootkit can be near impossible for the casual observer to detect, much less to remove.

  • The Best Defense 

 

Routinely scan your computer for malware and take appropriate steps to protect yourself, including:

  • Using strong passwords that don't repeat across sites
  • Installing anti-malware software and keeping it updated
  • Regularly installing security patches for your computer's operating system
  • Don't click suspicious links in email or on websites

 

 

Comments

Popular posts from this blog

KEY BOARD SHORT CUTS

While   surfing  the Web,  these commands  could  help  you  and  are absolutely worth learning. By making repetitive motions faster, web surfing becomes so easy  and    pleasant! The following shortcuts can  be   work with desktop versions of Chrome, Firefox, and IE. CTRL-T to launch a new browser tab page. Tabbed pages are very useful: they let you open multiple web pages simultaneously without the same memory load as a full browser window.  Simply press CTRL-T to launch a new tab. Related: use CTRL-Page Up and CTRL-Page Down to navigate between the tabs.  CTRL-Enter to type 'www.' and '.com' Once you ...

REVOLUTIONS-INDUSTRIAL AND INFORMATION

INDUSTRIAL   REVOLUTION  Starts   in   Europe  particularly  in  England  in  eighteen  century.It   changed  the  whole   of Europe   and   England 's  economy.During  this  period    New    machines  are  invented  in   England   to  speed  up  the    spinning  of  wool  and  cotton .At  first  they  were  powered  by  water  wheels  but  later steam  engines   are  developed.Iron   become  cheaper  and  stronger  as  Iron  making  techniques   improved.Canals  are  dug  to  carry   coal   from  the  mines and  to  transport  finished  goods.After ...

THE KING OF POP- MICHAEL JACKSON

Michael Joseph Jackson (August 29, 1958 – June 25, 2009) was an American singer, songwriter, and dancer. Dubbed the "King of Pop", he is regarded as one of the most significant cultural figures of the 20th century and one of the greatest entertainers in the history of music.   Michael Jackson is born. Pop sensation Michael Jackson is born on August 29, 1958, in Gary, Indiana. Jackson began performing with his four brothers in the pop group the Jackson 5 when he was a child. ... Jackson released several solo albums in the '70s, but his great breakthrough came in 1979 with Off the Wall.   Known as the "King of Pop," Michael Joseph Jackson was a best-selling American singer, songwriter and dancer. As a child, Jackson became the lead singer of his family's popular Motown group, the Jackson 5.   As a child, Jackson became the lead singer of his family's popular Motown group, the Jackson 5. He went on to a solo career of astonishing w...