https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ Tech-Talk: What's the difference- Malware, Viruses, Worms, Spyware, Trojans & Ransomware | Antivirus Software | Internet Security Software

What's the difference- Malware, Viruses, Worms, Spyware, Trojans & Ransomware | Antivirus Software | Internet Security Software

 

What's the difference- Malware, Viruses, Worms, Spyware, Trojans & Ransomware?


The last attack of malware worldwide, that of the now famous WannCrypt , has not only left little doubt the safety of hundreds of companies in the middle world, but also how much liam us sometimes when handling the terminology of these threats. Is a virus the same as malware? And what is ransomware and how is it different from other threats?

In general, we always call all this a computer virus and that's it. But today we are going to go a little further and we are going to explain to you what is the meaning of terms such as malware, viruses, worms, spyware, Trojans, ransomware, etc.

What Is Malware

The word malware comes from English, and it is the term resulting from the union of the words 'malicious software' or malicious software. Malware is a type of software that aims to infiltrate or damage a computer or information system without the consent of its owner.

Therefore, malware is the main term used to talk about all computer threats. Within this category we already have different classifications that are much more specific for threats, such as Trojans, worms, computer viruses, adware, spyware or ransomware, among others.

However, not all programs that can expose your data are malware. We have to distinguish it from faulty software, which are those programs that have not been designed with bad intentions, but that have certain errors within their code because of which your information can be exposed or your system becomes vulnerable to certain dangers.

What Is Computer Virus

A computer virus is a type of malware whose objective is to alter the correct functioning of a device. It does so by infecting the files on a computer using malicious code, and its main characteristic is that it requires user intervention to be executed. Moment in which it takes control in order to infect a computer and spread.

Although the first computer virus appeared in 1971, it was not until the 1980s that the term was officially adopted. This name is due to its resemblance to biological viruses that infect a cell, and this in turn spreads the virus to the rest of the cells of an organism.

There are different types of viruses, from those that are simple jokes made with the sole function of annoying to others that can seriously damage your computer by deleting files that directly affect its operation. In any of the cases, their point in common is that they all modify the normal behavior of a computer.

Viruses are generally completely transparent. They do not hide, but usually travel within executable files such as Windows .exe files. Of course, they can do it with the names of other applications in an attempt to trick you into trying to get you to run the program.

Computer Worm

The computer worm is another of the most common types of malware on the network, and its main difference from computer viruses is that it does not require user intervention or modification of any existing file to infect a computer. For the rest, it has the characteristic of replicating itself to spread over the networks to which a device is connected.

When it manages to penetrate a computer, the worm tries to obtain the addresses of other computers through your contact lists to send those copies and try to infect them as well. They do not have to manipulate any programs or cause the computer to malfunction, which makes them a bit more difficult to detect.

To do this, it is recommended that at the very first stage you must have an Antivirus Software installed in your PC which will keep an eye on the Viruses in your PCs and Fix it ASAP before any attack and then you check resources that could be consuming such as RAM, something that will make ordinary tasks become excessively slow. If you have one, you may also see that your team has sent messages without your permission via email or social networks.

Regarding their use, today these worms are often used for example to create botnets. These are networks of zombie computers that can act simultaneously when an operator gives them the order to send SPAM in bulk, spread malware or launch different types of computer attacks, DDoS or denial of service attacks.

What is a Trojan?

The Trojan has some similarities to computer viruses, but its operation is not exactly the same. While a virus is usually destructive, a Trojan tries to remain inconspicuous while accessing your device with the intention of executing hidden actions to open a back door so that other malicious programs can access it.

However, one of the commonalities between various types of malware is that Trojans will also come to you disguised as legitimate files. They will do it with executables that apparently will not do anything wrong when used, but that will immediately start working behind your back without you noticing.

Its name is that of the mythical Trojan horse from Homer's Odyssey, which according to the story was used to deceive the defenders of Troy. In the same way, this malware enters your computer disguised as a legitimate program, and once inside it makes a gap between your defenses so that other programs or types of malware have a way to enter.

Unlike the computer worms that we have told you about, Trojans do not spread themselves. You can get infected with one by deliberately receiving it, but they also tend to swarm on P2P networks or other websites with seemingly harmless executable applications. They are often used, among other things, to steal information without your consent through that back door.

What Is Spyware

It is another type of program that is installed on your computer by itself or through the interaction of a second application that launches it without you noticing. They tend to work in secret trying to hide their trail so you can raise your guard and act normally.

Its purpose is to collect information about the user or organization that owns a computer in an unauthorized manner. In such a way that they are not detected, these programs monitor and collect data on the actions carried out on a computer, the content of the hard disk, the applications installed or everything they do on the Internet. They can also install other applications.

What is Adware

Adware is a very controversial type of program and difficult to catalog. Some consider it a class of spyware, while others claim that it cannot even be considered malware because its ultimate intention is not to damage mainframes.

Its only mission is to get into your computer and start showing you advertising, either while you are browsing the internet, as a popup at random times or during the execution of a program. There are even those that are limited to replacing the advertising of a website with another of their own with which its creators can obtain benefits.

In general, this type of software is installed in programs that are later distributed for free as a source of income for their creators. The reason some people consider them spyware is because some of them can collect and send your personal data.

What is Ransomware

And finally we have ransomware. Ransom means ransom in English, and in fact what it does is hijack a computer's data and ask for a financial ransom in exchange for releasing it. Normally what it does is encrypt your data, and what they offer you in exchange for the financial ransom is the key to decrypting it.

This type of program can access your computer on the back of a computer worm or other type of malware, and once it encrypts your data, it will lock your computer showing you a warning screen informing you that you have been a victim of the attack. This screen also shows you the amount to pay and the payment method, which can be by SMS, Paypal or through bitcoins.

It is one of the threats that have been growing the most in recent years, so it is important to keep your computer always up-to-date and follow a series of precautions when dealing with suspicious emails or messages, always avoiding installing anything that you mail people you don't know.

Another tip that almost all computer security experts agree on is that you should try never to pay the ransom that is asked of you. By doing so you allow criminals to get away with it, and encourage them to continue to use this type of program. The easiest method to destroy it is to always use Antivirus Software, have up-to-date backup copies of your databases and format the affected computers, recovering them later with these copies.

 

No comments:

Post a Comment