...

Mischievous Malware

There are several types of malware, as well as mediums in which you may receive it.  So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away.

First, let’s take a quick look at the types of malware you may run into.

Viruses:

Viruses act similar to the flu virus, once the virus gets into a computer, it propagates by copying itself and becoming part of another program.  The virus spreads from computer to computer.  However, a virus must be activated by opening or running the file.  Viruses also include worms and Trojans.

Spyware:

This form of malware works just as its name intends.  It is software that usually piggybacks on legitimate downloads. Once it is in your computer, it spies on the information you key in and sends it to a website.  The first sign of spyware usually is a slow computer since it takes up many resources to run.

Adware:

We all know this one all too well. Those pesky pop-ups telling you your computer is infected or that you won money. These also piggyback on other applications or downloads, such as free computer wallpaper, widgets or toolbars.  Adware is kind of tricky, inherently it isn’t dangerous to your computer, annoying, but not dangerous. However, once clicked on you’ve basically opened the floodgates.

Ransomware:

With the popularity of cryptocurrency, ransomware has become more and more abundant. Often, this type of malware won’t damage your computer… right away.  Instead, it locks it and holds it hostage.  The hacker asks for a ransom and will provide a key only if and once the ransom has been paid.  If not, the hacker will usually wipe your device of all of its data.

Botware:

Another malware beginning to gain popularity due to the cryptocurrency gold rush.  Botware has the ability to turn your computer into a zombie by flooding it with denial-of-service attacks.

It helps hide anything going on below the surface.  A higher electricity bill can be a surprising symptom of botware.  Your computer’s CPU will be running constantly and the fan will run for longer than usual.

Now that you are a bit more familiar with the mischievous malware that could corrupt your devices, it’s time to delve into a lesser known malware scam.

Malvertising:

This has been gaining headway on Google, so much so, they created an individual landing page asking consumers to report malvertising and explaining how to combat it. The way this works is that cyber-criminals utilize several types of display advertisements to distribute malware.

A few ways you’d see malvertising is through auto-redirecting ads that will take you to a phishing page, clickbait and malicious code hidden within an ad.

Sadly, cyber criminals usually use legitimate ad networks because of the high volume of ads they distribute.  It makes it incredibly easy for them to throw a code into an ad without the advertiser having the slightest clue.  The worst malvertising connects users’ computers to an exploit kit that runs analysis on the defending computer, looking for vulnerabilities and exploiting them.

From there, attackers can install malware, ransomware, or gain full access to the computer and sensitive information. Sometimes Google may even flag your website for hosting malware, which will affect how you show up in search results.

Start typing and press Enter to search

IT Security Call Us Now Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.