0% found this document useful (0 votes)
50 views

Mason, Carlos, Malware

This document discusses different types of computer malware including worms, trojans, ransomware, and spyware. It provides examples of specific malware for each type. Worms spread copies of themselves from computer to computer and can steal information, like Worm.ExploreZip and Code Red II. Trojans act like real files but damage and steal data, such as Emotet and Zeus. Ransomware encrypts files and demands payment to unlock them, for example WannaCry and Locky. Spyware secretly observes user behavior and relays data to others, like CoolWebSearch and Gator. The document also lists signs of malware infection and good practices to avoid infection, such as keeping systems updated and

Uploaded by

Jack Linderalt
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Mason, Carlos, Malware

This document discusses different types of computer malware including worms, trojans, ransomware, and spyware. It provides examples of specific malware for each type. Worms spread copies of themselves from computer to computer and can steal information, like Worm.ExploreZip and Code Red II. Trojans act like real files but damage and steal data, such as Emotet and Zeus. Ransomware encrypts files and demands payment to unlock them, for example WannaCry and Locky. Spyware secretly observes user behavior and relays data to others, like CoolWebSearch and Gator. The document also lists signs of malware infection and good practices to avoid infection, such as keeping systems updated and

Uploaded by

Jack Linderalt
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

COMPUTER MALWARE

Worm
It is a malware that spreads copies of itself from computer to computer, and it can steal
information from those computers

Example:
Worm.ExploreZip -it is a macro virus that comes in the form of an email message. When the
attachment is opened, it looks like a corrupt self-extracting zip file. And it sends copies of
itself through email to addresses in ones email address book.

Code Red II - a worm that exploits a security holes in Microsoft Internet Information Server.

Trojan
It is a malicious code that acts like a real file that will damage and steal data on your
computer

Example:
Emotet - it is a banking malware where it is like a dropper of other banking trojans that
threatens states and governments both private and public sectors.

Zeus - a malware where it also targets Microsoft Windows and steals financial data. It
infected computers by spam messages and downloads where the hacker corrupts a legit
website that you use.
Ransomware
It is a malware that encrypts files on a computer, hiding and locking it, asking the person to
pay an amount of money to a designated link/email.

Example:
WannaCry - a crypto ransomware that is used to obtain money, by spreading through
computers that operate Microsoft Windows. The files were locked, and money was
demanded.

Locky - a ransom virus that usually arrives as an email with an attachment that has
gibberish. Then theres a message that advises you to enable macros if the file appears
unreadable, because its gibberish. If you do, it will run the Locky ransomware to your drive
and encrypt files.
Spyware
It is a software that installs itself on ones computer and starts observing ones online
behaviour. It secretly gahers information about someone or an organization and relays the
data to another person.

Example:
CoolWebSearch - it installs itself on Microsoft Windows computer, and it will get private
information by observing the owners behaviour and doings.

Gator - an adware program that might display banner ads based on the users online habits.
What are the signs you should look for to see if your computer has been infected with
malware?
-Your computer has slowed down, freeze, or crash a lot
-Error messages keeps popping up
-Tasks are interrupted by pop-ups
-Accounts are logged out from systems
-Antivirus software says that it is disabled
List down good practices to avoid infecting your computer with malware?
-Keep computer and systems updated
-Think twice thrice four times before clicking links
-Use antivirus software
-Limit file-sharing so less chances of infection

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy