Malware

Malware

Malware stands for malicious software. It is a broad term used to identify or mention those pieces of software that are performing some malicious activities either on your computer or your network.

It could range from gathering information via keystrokes,snapshots, participation in a group(botnet),messages & advt. being displayed on your computer and even encrpypting your data.

Malware and its types:

You could get malware installed on your computer by various means. Some of them are:

Virus

It is a malware that can reproduce itself.In order for it to execute, the victim must execute the program/softaware/application into which it is embeded. Read more about Viruses here.

Worms

They are malwares that self replicate and for doing so they do not need any human intervention (eg. You don't haev to execute a progam, like in the case of a virus). Read more about Worms here.

Ransomware & Crypto-Malware

Ransomware is when an attacker has got hold of your files and asks for ransom to be paid in return for your files.Read more about Ransomware and Crypto-Malware here.

Trojan-Horses & RATs

These are softwares that pretend to be innocent, but are actually malicious. Read more about Trojan Horses and RATs here.

Rootkits

A rootkit is a type of malware that modifies the kernel of an OS and gets embeded there.Read More about Rootkits here.

Keylogger

A keylogger is capable of capturing all your keystrokes and send them to the attacker. Read more about Keyloggers here.

Adware & Spyware

Malicious Softwares that display advt. and pop-ups on your computer screen or browser and spy on you are called adwares and spywares respectively.Read more about Adwares and Spywares here.

Bot and Botnets

A bot is a robot in control of an attacker (called Command-and-Control Center).Learn how it can bring down websites and entire networks down here.

Logic Bombs

Malwares that get triggered when a certain event happens is called a Logic Bomb. Read more about Logic-Bombs here.

Phishing

Technique used by attackers to convince their vicimts to give up personal info.Read how the lowest tech hack that can lead to loss in millions here.

Tailgating & Impersonation

Know how attackers are able to get through basic line of security by methods like Hailgating and Impersonation. You can read them here.

Denial Of Service

An attack meant to shut down a website,network, or machine and hence make it inaccessible to its users.Read more about Denial Of Service here.