Quick viewing(Text Mode)

Malicious Software 'Malware' It Performs Unwanted Tasks

Malicious Software 'Malware' It Performs Unwanted Tasks

Symptoms: Malware on Mobile Devices While these types of malware differ greatly Mobile devices are rapidly replacing the in how they spread and infect , personal at home and in the work- Malicious they all can produce similar symptoms. place. Because of our increasing reliance on ‘Malware’ Computers that are infected with malware mobile devices, they represent an emerging can exhibit any of the following symptoms: ready to be exploited by cyber- criminals. •Increased CPU usage •Slow computer or speeds Currently cybercriminals are developing •Problems connecting to networks malware to specifically target mobile devic- •Freezing or crashing es. •Modified or deleted files •Appearance of strange files, programs, or Google’s Android platform has become a desktop icons larger target for writers •Programs running, turning off, or reconfig- than Apple iOS. This could be a result of uring themselves (malware will often recon- Android’s popularity. figure or turn off antivirus and pro- grams) However, iOS isn’t 100% invulnerable. •Strange computer behavior •/messages being sent automatically Mobile malware writers know the best way and without ’s knowledge (a friend re- to infect as many devices as possible is to ceives a strange from you that you did attack central application markets. not send) Contact your manufacture and get the protection you need.

It performs unwanted tasks

CITY OF MEMPHIS INFORMATION SERVICES DIVISION Malware writers are very Skilled The Differences Malware is short for Many PC users consider Malware, Virus- in using tricks to get users to down- "malicious software." es, , , Worms, Trojans, load their malware. etc. as the same thing. While all these in- The word malware is a combination of two fections harm our computers, they are not words “malicious” and “software”. It is a Software that comes bundled with "other soft- the same. They are all types of malicious generic term used to describe all of the software and each behave differently. hostile and intrusive program codes ware" is often called a . including viruses, spyware, worms, For example: Trojans, or anything that is designed to 1. An instant messenger software bundled Spyware is a type of malware that func- perform malicious operations on a with a program such as WildTangent, a known tions by spying on user activity without computer. spyware offender. their knowledge. Adware (short for -supported The meanings of many of these words have 2. Peer-to-peer software, such as Kaaza, LimeWire, and eMule, bundle various software) is a type of malware that auto- changed over time. Some refer to how the matically delivers advertisements. malware infects your system while other types of malware that are categorized as spyware A virus is a form of malware that is capa- words are used to describe what the or adware. malware does once it’s active in your 3. Software that promises to speed up the ble of copying itself and spreading to oth- machine. connection or assist with downloads er computers. (e.g., My Web Search) will often contain adware. Bots are software programs created to au- Malware is any kind of unwanted software tomatically perform specific operations. that is installed without adequate . Malware exploits security holes in your browser A is a type of malicious software Viruses, Worms, and Trojan Horses are designed to remotely access or control a examples of malicious software that are as a way of invading your machine. It is im- computer without being detected by users often grouped together and referred to as portant to keep computer systems with or security programs. malware. the latest manufacture provided security patches. is a form of malware that Sometimes state that software is needed essentially holds a computer system cap- to view the site, in an attempt to trick users into tive while demanding a ransom. clicking "Yes" thus installing software onto their A Trojan horse, commonly known as a machines. “Trojan,” is a type of malware that dis- guises itself as a normal file or program to trick users into downloading and installing Some malware provides no uninstall option, and malware. installs code in unexpected and hidden places Worms (computer worms) are among the (e.g., the Windows registry) or modifies the op- most common types of malware. They erating system, thus making it more difficult to spread over computer networks by ex- remove. ploiting vulnerabilities.