What's the difference- Malware,
Viruses, Worms, Spyware, Trojans & Ransomware?
The
last attack of malware worldwide, that of the now famous WannCrypt ,
has not only left little doubt the safety of hundreds of companies in
the middle world, but also how much liam us sometimes when handling
the terminology of these threats. Is a virus the same as
malware? And what is ransomware and how is it different from other
threats?
In
general, we always call all this a computer virus and that's it. But today
we are going to go a little further and we are going to explain to you what
is the meaning of terms such as malware, viruses, worms, spyware, Trojans,
ransomware, etc.
What Is Malware
The
word malware comes from English, and it is the term resulting from
the union of the words 'malicious software' or malicious
software. Malware is a type of software that aims to
infiltrate or damage a computer or information system without the consent
of its owner.
Therefore, malware
is the main term used to talk about all computer threats. Within this
category we already have different classifications that are much more specific
for threats, such as Trojans, worms, computer viruses, adware, spyware or
ransomware, among others.
However,
not all programs that can expose your data are malware. We have to
distinguish it from faulty software, which are those programs that have not
been designed with bad intentions, but that have certain errors within their
code because of which your information can be exposed or your system
becomes vulnerable to certain dangers.
What Is Computer Virus
A
computer virus is a type of malware whose objective is to alter the correct
functioning of a device. It does so by infecting the files on a computer
using malicious code, and its main characteristic is that it requires user
intervention to be executed. Moment in which it takes control in
order to infect a computer and spread.
Although the
first computer virus appeared in 1971, it was not until the 1980s that the
term was officially adopted. This name is due to its resemblance to biological
viruses that infect a cell, and this in turn spreads the virus to the rest of
the cells of an organism.
There
are different types of viruses, from those that are simple jokes made with the
sole function of annoying to others that can seriously damage your computer by
deleting files that directly affect its operation. In any of the cases,
their point in common is that they all modify the normal behavior of
a computer.
Viruses are generally completely transparent. They do not hide, but usually travel within executable files such as Windows .exe files. Of course, they can do it with the names of other applications in an attempt to trick you into trying to get you to run the program.
Computer Worm
The
computer worm is another of the most common types of malware on the network,
and its main difference from computer viruses is that it does not require
user intervention or modification of any existing file to infect a
computer. For the rest, it has the characteristic of replicating itself to
spread over the networks to which a device is connected.
When
it manages to penetrate a computer, the worm tries to obtain the addresses
of other computers through your contact lists to send those copies and try
to infect them as well. They do not have to manipulate any programs or
cause the computer to malfunction, which makes them a bit more difficult to
detect.
To
do this, it is recommended that at the very first stage you must have an Antivirus Software
installed in your PC which will keep an eye on the Viruses in your PCs and Fix
it ASAP before any attack and then you check resources that could be consuming
such as RAM, something that will make ordinary tasks become excessively
slow. If you have one, you may also see that your team has sent messages
without your permission via email or social networks.
Regarding
their use, today these worms are often used for example to create botnets. These
are networks of zombie computers that can act simultaneously when an operator
gives them the order to send SPAM in bulk, spread malware or launch different
types of computer attacks, DDoS or denial of service attacks.
What is a Trojan?
The
Trojan has some similarities to computer viruses, but its operation is not
exactly the same. While a virus is usually destructive, a Trojan tries to
remain inconspicuous while accessing your device with the intention of executing
hidden actions to open a back door so that other malicious programs can
access it.
However,
one of the commonalities between various types of malware is that Trojans will
also come to you disguised as legitimate files. They will do it with
executables that apparently will not do anything wrong when used, but that will
immediately start working behind your back without you noticing.
Its
name is that of the mythical Trojan horse from Homer's Odyssey, which according
to the story was used to deceive the defenders of Troy. In the same way,
this malware enters your computer disguised as a legitimate program, and once
inside it makes a gap between your defenses so that other programs or
types of malware have a way to enter.
Unlike
the computer worms that we have told you about, Trojans do not spread themselves. You
can get infected with one by deliberately receiving it, but they also tend to
swarm on P2P networks or other websites with seemingly harmless executable
applications. They are often used, among other things, to steal information
without your consent through that back door.
What Is Spyware
It
is another type of program that is installed on your computer by itself or
through the interaction of a second application that launches it without you
noticing. They tend to work in secret trying to hide their trail so
you can raise your guard and act normally.
Its
purpose is to collect information about the user or organization that
owns a computer in an unauthorized manner. In such a way that they are not
detected, these programs monitor and collect data on the actions carried out on
a computer, the content of the hard disk, the applications installed or
everything they do on the Internet. They can also install other
applications.
Adware
is a very controversial type of program and difficult to catalog. Some
consider it a class of spyware, while others claim that it cannot even be
considered malware because its ultimate intention is not to damage mainframes.
Its
only mission is to get into your computer and start showing you advertising,
either while you are browsing the internet, as a popup at random times or
during the execution of a program. There are even those that are limited
to replacing the advertising of a website with another of their own with which
its creators can obtain benefits.
In
general, this type of software is installed in programs that are later
distributed for free as a source of income for their creators. The
reason some people consider them spyware is because some of them can collect
and send your personal data.
And
finally we have ransomware. Ransom means ransom in English, and in
fact what it does is hijack a computer's data and ask for a financial ransom in
exchange for releasing it. Normally what it does is encrypt your data, and
what they offer you in exchange for the financial ransom is the key to
decrypting it.
This
type of program can access your computer on the back of a computer worm or
other type of malware, and once it encrypts your data, it will lock your
computer showing you a warning screen informing you that you have been a victim
of the attack. This screen also shows you the amount to pay and
the payment method, which can be by SMS, Paypal or through bitcoins.
It
is one of the threats that have been growing the most in recent years, so it is
important to keep your computer always up-to-date and follow a series of
precautions when dealing with suspicious emails or messages, always
avoiding installing anything that you mail people you don't know.
Another
tip that almost all computer security experts agree on is that you should try
never to pay the ransom that is asked of you. By doing so you allow
criminals to get away with it, and encourage them to continue to use this type
of program. The easiest method to destroy it is to always use Antivirus Software, have
up-to-date backup copies of your databases and format the affected computers,
recovering them later with these copies.
No comments:
Post a Comment