Malware is a malicious program or software that disrupts or damages the computer.
The three types of malware:
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator. An example of a virus is the Melissa virus.
Worms: These are standalone programs that run independently and infect systems. For example, W32.Alcra.F is a worm that propagates through network share devices.
Trojan: Named after the famed wooden gift horse Greek soldiers used to invade the city of Troy, Trojans operate in a similar fashion. They are disguised as a legitimate or even beneficial program, and once a user enables them, they infect the computer. They are not self-replicating and can only be spread by user interaction, typically through email attachments or internet downloads.
What Are The Effects Of Malware?
Overwhelming system resources: Malware, especially worms, can spread around and overwhelm a system or network. Some malware creates so many folders that no memory is left and slows a computer down.
Creating a backdoor: Let’s look at an example: Microsoft sends updates every Sunday on all Windows platforms. How do these updates reach to your Windows OS? They create backdoors from where they can send updates. Similarly, hackers create backdoors from where they can continuously send viruses after getting into a system.
Disabling security functions: Some malware can disable antivirus software, as well as security updates. This malware tends to last longer because there is no security to stop it. They tend to keep the system vulnerable to other malware.
Creating botnets: Hackers make botnets by purely coding. A botmaster controls botnets, and they are usually used to crash websites. Botmaster tells all botnets to flood the website by accessing the website at the same time.
How Can Malware Get Into Your Device?
Removable media: Removable media, like Pendrive, CDs, DVDs, and flash drives, may be used to send viruses to your system.
Documents and executable files: Viruses can be hidden in document files with the .exe extension. As soon as you open them, the virus activates.
Internet downloads: Download files only from trusted websites. If you download from untrusted websites, there may be chances that those files will contain viruses, and as soon as you open them, the hacker might get access to your system.
Network connections: Be sure that your service provider is genuine. If the network is unsecured, then it can be accessed by anyone.
Email attachments: Never open email attachments unless the sender can be trusted. These files may contain viruses to create backdoors.
Malicious advertisements: Never click on ads that you don’t trust. They are created so that you can click on them, and hackers will receive details about you.