Cybersecurity - Types of malware

Cybersecurity - Types of malware


Spyware



Spyware

Designed to track and spy on you, spyware monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details. Spyware does this by modifying the security settings on your devices.

It often bundles itself with legitimate software or Trojan horses.

Adware



Adware

Adware is often installed with some versions of software and is designed to automatically deliver advertisements to a user, most often on a web browser. You know it when you see it! It’s hard to ignore when you’re faced with constant pop-up ads on your screen.

It is common for adware to come with spyware.

Backdoor


Backdoor

This type of malware is used to gain unauthorized access by bypassing the normal authentication procedures to access a system. As a result, hackers can gain remote access to resources within an application and issue remote system commands.

A backdoor works in the background and is difficult to detect.

Ransomeware


Ransomware

This malware is designed to hold a computer system or the data it contains captive until a payment is made. Ransomware usually works by encrypting your data so that you can’t access it.

Scareware


Scareware

This is a type of malware that uses 'scare’ tactics to trick you into taking a specific action. Scareware mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program for it to return to normal operation.

Rootkit


 Rootkit

This malware is designed to modify the operating system to create a backdoor, which attackers can then use to access your computer remotely. Most rootkits take advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.

Virus


Virus

A virus is a type of computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its own code. Most viruses require end-user interaction to initiate activation and can be written to act on a specific date or time.

Trojan Horse


Trojan horse

This malware carries out malicious operations by masking its true intent. It might appear legitimate but is, in fact, very dangerous. Trojans exploit your user privileges and are most often found in image files, audio files or games.

Worms


Worms

This is a type of malware that replicates itself in order to spread from one computer to another. Unlike a virus, which requires a host program to run, worms can run by themselves. Other than the initial infection of the host, they do not require user participation and can spread very quickly over the network.

All image, inspiration credit goes to :

This confirms you are planning something in Cyber Security soon.

To view or add a comment, sign in

More articles by Amit Shah

  • Ollama - Buzzword Everywhere? Let’s Simplify.

    What if I tell you running your own LLM (Large Language Model) is as simple as: 📁 Creating folders 📄 Managing files…

    2 Comments
  • 10 Steps approach for application security

    Implement secure SDLC framework Application validation against OWASP top 10 Security requirement at the start of SDLC…

  • Security as Culture right at the time of Code

    Validate all inputs at the server Prefer white lists to black lists Escape special characters Use prepared statements…

    1 Comment
  • Production Ready API Checklist

    While deploying API on production, taking care of checklist mentioned below ensures API is production ready…

  • Clear PL-900

    What all you need? Motivation - Vimal Patel 8 hours - For preparation 2 hours - Hands on 3 hours - For practice test…

  • Apache Hardening on Ubuntu

    Your web server at risk if you don't harden it. Basic steps are provided below to harden it.

  • Clear AI-900

    What all you need? Motivation - Vimal Patel 8 hours - For preparation 2 hours - Hands on 3 hours - For practice test…

  • Clear DP-900

    What all you need? Motivation - Vimal Patel 8 hours - For preparation 2 hours - Hands on 3 hours - For practice test…

  • Fall in love with Astro ....

    Astro What is it? The real Jam stack Static site generator Ships with Svelte, React, Preact, Vue, HTML templates…

  • Go Hugo

    What is hugo? Static site generator, as fast as you want to build, using the technology which you are aware (html, css,…

Others also viewed

Explore content categories