Top 5 Least Wanted Malware
Total Page:16
File Type:pdf, Size:1020Kb
Halloween Edition WHAT IS MALWARE? Malware is an abbreviated term meaning “malicious software.” This is software that is specically designed to gain access or damage a computer without the knowledge of the owner. TOP 5 LEAST WANTED MALWARE Ransomware Botnet POS Malware RAT Browser-based 5 5 Malware 5 5 5 $ $ $ 4 $ (malware that restricts access 4 ur computer while to yo y a ransom demanding you pa 4 (also known as a zombie army) to get access back) 4 (a malicious software expressly 4 written to steal customer payment data) (Remote Access Trojan) (also known as “Man in the browser”) 2 4 1 3 5 Remote Access Trojan or RAT A malware program that includes a 1 back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment. Botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Browser-based malware (also known as “Man in the browser”) is a security attack where the perpetrator 3 installs a trojan horse on a victim's computer that's capable of modifying that user's web transactions as they occur in real time. Ransomware A form of computer malware that restricts access to your 4 computer or its information, while demanding you pay a ransom to get access back. $ POS malware $ $ A malicious software $ expressly written to steal customer payment data – especially credit card data – from retail checkout. HOW TO STOP MALWARE IN ITS TRACKS 1 Awareness Backup Basic Backup Tips: Offline • Simplify Backups - Create global share for important stu - Create a data partition Provide - Use OS “Documents” directory • Keep oine backups Peace of • Encrypt backups Mind • Automate Backups 3 Defense in Depth Ransomware Requires Defense in Depth Advanced threats, by denition, leverage multiple vectors of attack. No single defense will protect you completely from computer attacks. FFi rierew waa m llll ste Sy n Int tio ru en si ev on Pr The more layers of An ti Vir security you have, the us greater chance an An additional protection tiS pa might catch an m Re advanced threat that pu s ta ce other layers might miss. tio rvi AP n Se T P ro te ct ion FOR A FREE TRIAL, VISIT WATCHGUARD.COM/EVAL.