PCs, Mac computers, laptops, smartphones and tablets are all subject to an ever growing variety of malicious software programs and other security threats. As a first step towards securing your devices and protecting yourself online, it’s worth ensuring you have a good understanding of the major categories of malware and other threats.
The name malware is short for ‘malicioussoftware’. Malware includes any software program that has been created to perform an unauthorised — and often harmful — action on a user’s device. Examples of malware include:
For more information about Malware, see the following articles — ‘Who Creates Malware?’ and ‘Malware Classifications’.
For more information about computer viruses and worms, see the following article — ‘What is a Computer Virus or a Computer Worm?’
A Trojan is effectively a program that pretends to be legitimate software — but, when launched, it will perform a harmful action. Unlike computer viruses and worms, Trojans cannot spread by themselves. Typically, Trojans are installed secretly and they deliver their malicious payload without the user’s knowledge.
Cybercriminals use many different types of Trojans — and each has been designed to perform a specific malicious function. The most common are:
For more information about Trojans, see the following article — ‘What is a Trojan?’
In Greek mythology — during the Trojan war — the Greeks used subterfuge to enter the city of Troy. The Greeks constructed a massive wooden horse — and, unaware that the horse contained Greek soldiers, the Trojans pulled the horse into the city. At night, the Greek soldiers escaped from the horse and opened the city gates — for the Greek army to enter Troy.
Today, Trojan viruses use subterfuge to enter unsuspecting users’ computers and devices.
For more information about Trojans, see the following article — ‘What is a Trojan?’
A keylogger is a program that can record what you type on your computer keyboard. Criminals use keyloggers to obtain confidential data — such as login details, passwords, credit card numbers, PINs and other items. Backdoor Trojans typically include an integrated keylogger.
Phishing is a very specific type of cybercrime that is designed to trick you into disclosing valuable information — such as details about your bank account or credit cards. Often, cybercriminals will create a fake website that looks just like a legitimate site — such as a bank’s official website. The cybercriminal will try to trick you into visiting their fake site — typically by sending you an email that contains a hyperlink to the fake site. When you visit the fake website, it will generally ask you to type in confidential data — such as your login, password or PIN.
For more information about Phishing, see the following page — ‘Spam and Phishing’.
Spyware is software that is designed to collect your data and send it to a third party — without your knowledge or consent. Spyware programs will often:
In addition to the potential damage that can be caused if criminals have access to this type of information, spyware also has a negative effect on your computer’s performance.
In a drive-by download, your computer becomes infected just because you visit a website that happens to contain malicious code.
Cybercriminals search the Internet — looking for vulnerable web servers that can be hacked. When a vulnerable server is found, the cybercriminals can inject their malicious code onto the server’s web pages. If your computer’s operating system — or one of the applications running on your computer — has an unpatched vulnerability, a malicious program will be automatically downloaded onto your computer when you visit the infected web page.
Rootkits are programs that hackers use in order to evade detection while trying to gain unauthorised access to a computer. Rootkits have been used increasingly as a form of stealth to hide Trojan virus activity. When installed on a computer, rootkits are invisible to the user and also take steps to avoid being detected by security software.
The fact that many people log into their computers with administrator rights — rather than creating a separate account with restricted access — makes it easier for cybercriminals to install a rootkit.
Adware programs either launch advertisements — such as pop-up banners — on your computer or they can redirect search results to promotional websites.
If your web browser doesn’t have the latest updates, it may contain vulnerabilities that can be exploited by hackers’ tools — or Browser Hijackers — that can download adware onto your computer. Browser Hijackers can change browser settings, redirect incorrectly typed or incomplete URLs to a specific site, or change your default homepage. They may also redirect Internet searches to pay-to-view and pornographic websites.
For more information about Adware, see the following article — ‘Adware, Pornware and Riskware ’.
A botnet is a network of computers controlled by cybercriminals using a Trojan virus or other malicious program.
For more information about botnets, see the following article — ‘What is a Botnet?’.
Denial-of-Service (DoS) attacks are designed to hinder or stop the normal functioning of a website, server or other network resource. Hackers can achieve this in several different ways — such as sending a server many more requests than the server is able to cope with. This will make the server run slowly — so that web pages will take much longer to open — and can make the server crash completely, so that all websites on the server are unavailable.
A Distributed-Denial-of-Service (DDoS) attack is similar to a DoS. However, a DDoS attack is conducted using multiple machines. Usually, for a DDoS attack, the hacker will use one security compromised computer as the ‘primary’ machine that co-ordinates the attack by other ‘zombie machines’. Typically, the cybercriminal will compromise the security on the primary and all of the zombie machines, by exploiting a vulnerability in an application on each computer — to install a Trojan or other piece of malicious code.
For more information about DDoS attacks, see the following article — ‘Distributed Network Attacks / DDoS’.
Other articles and links related to malware and security
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.