visit
Viruses need an already-infected active operating system or program in order to work and are typically attached to an executable file (.exe) or Word document (hence the emails). So how does it work really?
The virus lies dormant in the computer until you activate it. The simplest and more known example to us all is when you receive an email with an attached file that contains the virus. In order to activate the virus, you need to download the file onto your computer.
A Trojan horse is based on the mythology of the Trojan War back in Ancient Greece. Many of us might know about the Trojan War through the infamous movie “
Worms are spread via a glitch or weakness in software or in an operating system (known as software vulnerabilities) or via phishing attacks. Once a worm has been installed onto your computer, it starts to spread, infecting the whole computer and in some cases your whole network (meaning whoever accesses your internet). This type of malware can:
Ransomware is a type of malware that denies or restricts access to your own files. In order for you to regain access to your files, you need to pay a ransom to the hacker. Ransomware can have a huge impact on your computer and cause damages that can reach hundreds of millions of dollars.
A Spyware secretly records your online activity, collecting your data and personal information such as usernames, passwords, browser history, and so on. Spyware is a common threat and is often used for identity theft and credit card fraud. Once you have downloaded the Spyware onto your computer, it sends your data to advertisers or cybercriminals.
Adware is one of the better-known types of malware. These are pop-ups or display ads that often have no relevance to you, i.e. “You have won an iPhone, click here to claim your prize”. In general, Adware is annoying and slows your computer down. In most cases, these types of adware that are hidden within an ad are linked to sites where malicious downloads wait to be downloaded onto your computer. Moreover, Adware can also deliver Spyware allowing hackers to gain remote access to your computer.
Phishing is a bit different from other malware categories. Phishing or Spam is a type of social attack, rather than software. Phishing and Spam is the most common and widely known method of cyber attack. Phishing and Spam are shared via emails, texts, and web links which are “requests type of messages” sent by criminals in order to acquire your personal and financial information. For example, “FBI requires you to enter some data in order to disburse the amount of $100,000 that was sent by XXXX from Africa”, “your Netflix billing information needs to be updated”, or “your Apple ID has been hacked”, and many other email phishing scams that look as if they are sent by a well-known company. But when you see carefully who the sender is, you will not see [email protected], [email protected], but [email protected]. These are highly sophisticated phishing scams and can fool even the savviest of us. Always look at the email address sender, look at who else is CC’ed in the email, and think whether this specific email address is actually linked to your apple id, Netflix, PayPal, and so on.
A bot is a computer that’s been infected with malware in order to be remotely controlled by a hacker. Once the hacker has remote access to your computer, the bot can then be used to launch more attacks on other computers or devices that are part of your home network, or to become part of a collection of bots, creating a botnet. Botnets have become a trend because of our IoT and Connected Home devices and it is an easy way for cybercriminals to access your home and spread ransomware.
Unfortunately, the more technology evolves the more sophisticated the cyber-attacks become. Therefore, basic security practices such as educational blog posts, company-focused user awareness training, as well as companies employing state-of-the-art cyber strategy protection, will allow us as a community to better position and protect ourselves against these unwanted cyber threats, making sure that we have a real positive impact on cyber security improvement programs.
by , Senior Product Manager, and , Director Engineering at Avast Secure Browser Team