What are Malware, Trojans, backdoors, and other Virus types?
Adware
Adwares are mainly designed to show advertisements on your screen without your permission. This can be categorized into PUP ( potentially unwanted program). Adwares are harmless but can be really annoying.
Examples of ADWARE
How is it deliverd?
Impacts
How you can avoid it.
Virus
A malicious code initiated by user interaction and executes its own code without a user concent . The virus can be designed with replicating mechanisms. The word ‘virus’ comes from Latin which means poison.
Examples of Virus
How is it deliverd?
Impacts
How you can avoid it.
Worm
A malicious code that replicates itself and spread across other computers. Worms can cause major disruption in the network by causing unwanted traffic. Worms are more infectious than viruses they not only compromise the targeted computer but also spread t other computer in the network and infect them too.
Examples of Worm
How is it deliverd?
Impacts
How you can avoid it.
Trojan Horse
A malicious code injected into an OS with the help of an application without user consent (backdoor). It will take full control of your system. Open up service from the system, for example, listen to specific port 443- HTTPS. Can be designed to avoid detection by antivirus. Once the code installed on your computer it can damage, disrupt steal, and infect your computer. Most of the backdoors are delivered through Trojan.
” A trojan can be a Swiss Army knife of hacking” Malwarebytes
Examples of Trojan
How is it deliverd?
Impacts
How you can avoid it.
Ransomeware
A malicious code injected to the System without user consent. This can restrict access to your system, files, or any other services in your computer and demands a ransom payment to get back your access.
Most of the Ransome payments are requested via cryptocurrencies. Once you make the payment we cannot trace the transaction thus the attacker can keep their anonymity.
Examples of Ransomeware
How is it deliverd?
Impacts
How you can avoid it.
Phishing
Phishing is the most common, simple, and most effective way of hacking. The users can be tricked into a page that looks legitimate and steals your user credentials, banking details, or any information which can be useful for the attacker.
Examples of Phishing
How is it deliverd?
Impacts
How you can avoid it.
Honorable mentions
Polymorphic Malware – A type of malware that changes itself to avoid detection. Any above types of malware can be polymorphic.
Armed Virus – Programmed to avoid detection and do specific damage to computers mainly used in cyber warfare.
Logic Bombs – As the name says it will execute a malicious program when certain logic is met.
Have you noticed something common to all malware, yes you can avoid a big junk of such malicious malware simply by getting basic security training or by self-educating.
When your company provides a cyber security awareness program make sure you do not miss it . . .
Prevention is better than cure!