Malware A malware also known as a malicious software is a type of software that is written by someone to cause damage to a computer device, computer server, computer client and computer networks. Malware are designed to infiltrate and cause havoc to a computer device and network. There are many types of malware such as computer virus, ransomware, worm, Trojan horse, adware, spyware, botnet, rootlet and keystroke logger. Malware is one of the most dangerous and expensive damages in Cyber Security.
Virus A virus is a malicious code written by someone that propogate from one device to another by attaching itself to other files through a process called self-replication. The virus executes when someone clicks or executes the file that is use either destroy, corrupt or erase the information.
Advanced Persistent Threats An APT is high level attack to gain access to sensitive materials and maintain unauthorized access to target machines. One of the main features of APT is their ability to cover their tracks. Nation States, High level Hackers use this type of sophisticated attacks. Operation Olympic Stuxnet which cause damages to the Iranian Nuclear Facilities and Operation Aurora are examples of APT attacks.
Ransomware A ransomware or crypto-locker virus is a type of malware that will hold the target device hostage by either encrypting things or making devices not usable till the victim pays the ransom to access it. WannaCry is a famous ransomware that created havoc in many networks.
Boot Sector Boot sector viruses change the code in the master boot record (MBR) of the hard drive.
Executable Executable viruses reside in executable files. They are literally extensions of executables and are unable to exist by themselves.
Logic Bomb A logic bomb is a code that sits dormant on a target device until it is triggered by a specific date and time. Once the code is triggered it will take action that was intended to perform on the victims’ machine.
Botnets A botnet or zombies are a bunch of devices that has been infected by a command control server that an attacker performed that will perform a denial or distributed denial service attacks which will cause the device or networks to shutdown.
Macro Macro viruses are specially written application macros. These viruses will auto-start when the particular application is run and will then attempt to make more copies of themselves.
Trojan Trojans are true, freestanding programs that do something other than what the person who runs the program thinks they will do. An example of a Trojan is the MS Antivirus which looks like a legit application provided by Microsoft but hidden in the embedded code is a malicious software that will insert the malware to cause damage to your device. Some Trojans are quite sophisticated. Another form of Trojan (RAT) Remote Access Trojan is a specialized Trojan horse that specifically lets a hacker with unauthorized access to the victims’ machine.
Worm A worm is a very special form of malware. Unlike all of the other viruses described, a worm does not infect other files on the computer. Instead, a worm replicates by making copies of itself on other systems on a network by taking advantage of security weaknesses in networking protocols. The Morris and Nimda Worm are some of the most famous worm ever created.
Bimodal/Bipartite A bimodal or bipartite virus uses both boot-sector and executable functions.
Polymorphics/Polymorphs A polymorphs virus attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code.
Stealth The term “stealth” is more of a concept than an actual virus function. Most stealth virus programs are boot sector viruses that use various methods to hide from antivirus software.
Adware Is a type of unwanted pop-up ad that can cause malicious code into the target machine when executed.
Spyware A type of malicious software that is installed either locally or remotely to a target device which will them obtain data and sensitive information such personal information, banking, passwords, usernames and credit card information.
Keylogger A keylogger is a physical device such as key ghost or a software application such as all-in-one key logger that when installed in the victims’ machine will record the victims’ key strokes, sensitive information and visual information.
Antivirus Tools The only way to protect your PC permanently from getting a virus is to disconnect from the Internet and never permit any potentially infected software to touch your precious computer. Because neither scenario is likely these days, you need to use a specialized antivirus program to help stave off the inevitable virus assaults.
Well known Antivirus Tools
Bit Defender Trend Micro Kaspersky Norton McAfee AVG Avast Avira Malwarebytes Panda Computer Associates Eset Webroot F-Secure Windows Defender
Virus Prevention Tips
Install an Antivirus/Malware Software Install a Security Suite that install the Antivirus, Firewall, IDS/IPS, Proxy and VPN Keep up with the Antivirus/Malware Security Suite Updates Download the latest updates for your Operating System Perform a regular scan schedule scans with your Antivirus/Malware Security Suite Applications Use common sense, do not click, execute or download anything from sites you do not trust Encrypt all your drives and files so that it would be hard to compromise the information Be careful of Public Wi-Fi Backup all your files or keep a disk image of all your files and environment Use long, strong and complex passwords Use Biometrics such as fingerprint scan or face recognition software for log ins.
What are the symptoms of Malware Your computer run slow or really slow You get icons from nowhere or they become real big icons for no reason Your icons disappear and your settings are out of whack You homepage suddenly change to some mysterious site Your device will intermittently start or shutdown for no reason You get the infamous BSOD Blue Screen of Death Pop-ups and unwanted toolbars and programs You are sending SPAM E-Mail Lack of storage space Programs opening and closing automatically Suspicious activity on your machine Your device will crash Unusual error messages popping up Your security suite is disabled You cannot access anything Your computer shutsdown