Вы находитесь на странице: 1из 2

LIST OF MALWARE

1. Rootkit
A rootkit is a type of malicious software that is activated each time your
system boots up. Rootkits are difficult to detect because they are activated
before your system's Operating System has completely booted up. A rootkit
often allows the installation of hidden files, processes, hidden user accounts,
and more in the systems OS. Rootkits are able to intercept data from
terminals, network connections, and the keyboard.

2. Adware
Adware is the common name used to describe software that is given to the
user with advertisements embedded in the application. Adware is considered
a legitimate alternative offered to consumers who do not wish to pay for
software. There are many ad-supported programs, games or utilities that are
distributed as adware (or freeware). Today we have a growing number of
software developers who offer their goods as "sponsored" freeware (adware)
until you pay to register. If you're using legitimate adware, when you stop
running the software, the ads should disappear, and you always have the
option of disabling the ads by purchasing a registration key.

3. Viruses

Viruses are programs that infect other files in a computer. They are
sometimes used by cybercriminals to turn off system processes, including
antivirus and other security programs. Microsoft said it detected a high
amount of infections of the Sality virus, which targets Windows executable
files, delivering damaging malware that deletes files and cripples the normal
system functions.

4. Trojan Horse

A Trojan horse is a program or utility that appears to be something useful or


safe, but in reality is performing background tasks such as giving access to
your computer or sending personal information to other computers. Trojan
horses are one of the most common methods a criminal uses to infect your
computer and collect personal information from your computer.

5. Backdoor
Also called a trapdoor. An undocumented way of gaining access to a
program, online service or an entire computer system. The backdoor is
written by the programmer who creates the code for the program. It is often
only known by the programmer. A backdoor is a potential security risk.
6. Spyware
Spyware is any technology that aids in gathering information about a person
or organization without their knowledge. On the Internet (where it is
sometimes called a spybot or tracking software), spyware is programming
that is put in someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties. Spyware can get in
a computer as a software virus or as the result of installing a new program.
7. Computer Worms

A computer worm is a self-replicating computer program that penetrates an


operating system with the intent of spreading malicious code. Worms utilize
networks to send copies of the original code to other computers, causing
harm by consuming bandwidth or possibly deleting files or sending
documents via email. Worms can also install backdoors on computers.
8. Logic Bomb
In a computer program, a logic bomb, also called slag code, is programming
code, inserted surreptitiously or intentionally, that is designed to execute (or
"explode") under circumstances such as the lapse of a certain amount of time
or the failure of a program user to respond to a program command.
9. Scareware
As its name implies, scareware is a form of malware that thrives on
frightening people into using it. Usually backed by extremely shady and highly
unethical marketing practices, scareware attempts to convince consumers
that something terrible will happen unless they begin to use whichever
product the person behind the scareware is peddling. The ironic thing is that
the scareware is usually the very thing its pretending to warn you about.
10. Botnets
A botnet refers to a type of bot running on an IRC network that has been
created with a trojan. When an infected computer is on the Internet the bot
can then start up an IRC client and connect to an IRC server. The Trojan will
also have been coded to make the bot join a certain chat room once it has
connected. Multiple bots can then join in one channels and the person who
has made them can now spam IRC chat rooms, launch huge numbers
of Denial of Service attacks against the IRC servers causing them to go
down.

Вам также может понравиться