Malware
A malware also known as a malicious software is a type of software that is written by someone to cause damage to a computer device, computer server, computer client and computer networks. Malware are designed to infiltrate and cause havoc to a computer device and network.
There are many types of malware such as computer viruses, ransomware, worms, Trojan horse, adware, spyware, botnet, rootlet, and keystroke logger. Malware is one of the most dangerous and expensive damages in Cyber Security. Therefore, it seems crucial to use effective cyber security mechanisms for computers and mobiles (see mobile application shielding system as an example), which can block and remove most of the malware.
Virus
A virus is a malicious code written by someone that propogate from one device to another by attaching itself to other files through a process called self-replication. The virus executes when someone clicks or executes the file that is use either destroy, corrupt or erase the information.It is for this reason that almost every software developer uses various testing techniques (such as Hummingbird Systems Penetration Testing) for their software to detect vulnerabilities that can be exploited and fix them as soon as possible.
Advanced Persistent Threats
An APT is high level attack to gain access to sensitive materials and maintain unauthorized access to target machines. One of the main features of APT is their ability to cover their tracks. Nation States, High level Hackers use this type of sophisticated attacks. Operation Olympic Stuxnet which cause damages to the Iranian Nuclear Facilities and Operation Aurora are examples of APT attacks.
Ransomware
A ransomware or crypto-locker virus is a type of malware that will hold the target device hostage by either encrypting things or making devices not usable till the victim pays the ransom to access it. WannaCry is a famous ransomware that created havoc in many networks.
Boot Sector
Boot sector viruses change the code in the master boot record (MBR) of the hard drive.
Executable
Executable viruses reside in executable files. They are literally extensions of executables and are unable to exist by themselves.
Logic Bomb
A logic bomb is a code that sits dormant on a target device until it is triggered by a specific date and time. Once the code is triggered it will take action that was intended to perform on the victims’ machine.
Botnets
A botnet or zombies are a bunch of devices that has been infected by a command control server that an attacker performed that will perform a denial or distributed denial service attacks which will cause the device or networks to shutdown.
Macro
Macro viruses are specially written application macros. These viruses will auto-start when the particular application is run and will then attempt to make more copies of themselves.
Trojan
Trojans are true, freestanding programs that do something other than what the person who runs the program thinks they will do. An example of a Trojan is the MS Antivirus which looks like a legit application provided by Microsoft but hidden in the embedded code is a malicious software that will insert the malware to cause damage to your device. Some Trojans are quite sophisticated. Another form of Trojan (RAT) Remote Access Trojan is a specialized Trojan horse that specifically lets a hacker with unauthorized access to the victims’ machine.
Worm
A worm is a very special form of malware. Unlike all of the other viruses described, a worm does not infect other files on the computer. Instead, a worm replicates by making copies of itself on other systems on a network by taking advantage of security weaknesses in networking protocols. The Morris and Nimda Worm are some of the most famous worm ever created.
Bimodal/Bipartite
A bimodal or bipartite virus uses both boot-sector and executable functions.
Polymorphics/Polymorphs
A polymorphs virus attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code.
Stealth
The term “stealth” is more of a concept than an actual virus function. Most stealth virus programs are boot sector viruses that use various methods to hide from antivirus software.
Adware
Is a type of unwanted pop-up ad that can cause malicious code into the target machine when executed.
Spyware
A type of malicious software that is installed either locally or remotely to a target device which will them obtain data and sensitive information such personal information, banking, passwords, usernames and credit card information.
Keylogger
A keylogger is a physical device such as key ghost or a software application such as all-in-one key logger that when installed in the victims’ machine will record the victims’ key strokes, sensitive information and visual information.
Antivirus Tools
The only way to protect your PC permanently from getting a virus is to disconnect from the Internet and never permit any potentially infected software to touch your precious computer. Because neither scenario is likely these days, you need to use a specialized antivirus program to help stave off the inevitable virus assaults.
Well known Antivirus Tools
Bit Defender
Trend Micro
Kaspersky
Norton
McAfee
AVG
Avast
Avira
Malwarebytes
Panda
Computer Associates
Eset
Webroot
F-Secure
Windows Defender
Virus Prevention Tips
Install an Antivirus/Malware Software
Install a Security Suite that install the Antivirus, Firewall, IDS/IPS, Proxy and VPN
Keep up with the Antivirus/Malware Security Suite Updates
Download the latest updates for your Operating System
Perform a regular scan schedule scans with your Antivirus/Malware Security Suite Applications
Use common sense, do not click, execute or download anything from sites you do not trust
Encrypt all your drives and files so that it would be hard to compromise the information
Be careful of Public Wi-Fi
Alternately, get a private broadband connection or use a satellite connection (check out best satellite internet provider if interested) to avoid any malware attack.
Backup all your files or keep a disk image of all your files and environment
Use long, strong and complex passwords
Use Biometrics such as fingerprint scan or face recognition software for log ins.
What are the symptoms of Malware
Your computer run slow or really slow
You get icons from nowhere or they become real big icons for no reason
Your icons disappear and your settings are out of whack
You homepage suddenly change to some mysterious site
A virus may be to blame if your internet speed is slow since they are one of the most common reasons for slow internet speeds
Your device will intermittently start or shutdown for no reason
You get the infamous BSOD Blue Screen of Death
Pop-ups and unwanted toolbars and programs
You are sending SPAM E-Mail
Lack of storage space
Programs opening and closing automatically
Suspicious activity on your machine
Your device will crash
Unusual error messages popping up
Your security suite is disabled
You cannot access anything
Your computer shutsdown