Beware of Malware
Malware is one of the biggest threats to the security of your computer, tablet, phone, and other devices. The different types of malware include viruses, ransomware, spyware and other unwanted software that hackers secretly install onto your device. When malware is installed on your device, a criminal can use it to steal your information, send you unwanted or inappropriate mail or messages, demand payment to unscramble data encrypted by ransomware, and make your device vulnerable to even more malware. Here’s what you need to know to recognize and avoid malware.
Criminals work to get malware on your devices so they can steal personal information, like your usernames and passwords, bank account numbers, or Social Security number. They use this information to commit identity theft. If you think someone may have stolen your information or identity, visit IdentityTheft.gov.
The Different Types of Malware
Ransomware
Ransomware is malicious software, or malware, that prevents you from accessing your computer files, systems, or networks. There is usually a demand that you pay a ransom for their return. Ransomware attacks can be costly and can cause disruptions to operations, and sometimes the loss of critical information.
You can unknowingly download ransomware onto a computer just by performing a variety of different everyday actions -- such as opening an email attachment, clicking an ad, following a link, or visiting a website that's embedded with malware. Once a computer is infected with crypto malware, the user's documents are encrypted with a secret key that effectively keeps the user from accessing their files.
Often, you don't know that your computer has been infected. You usually discover it when you can no longer access your data, or you receive a message letting you know about the attack and demanding ransom payments.
Virus
A virus is a malicious software attached to a document which uses your computer files to execute its code and spread from host to host. Once downloaded, the virus will lay dormant until the infected file is opened and in use. Viruses are designed to disrupt a system’s ability to operate. As a result, viruses can cause significant operational issues and data loss.
Worms
Worms are a malicious software that rapidly replicate and spread to any device within the network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a device via a downloaded file or a network connection before it multiplies and disperses at a rapid rate. Like viruses, worms can severely disrupt the operations of a device and cause data loss.
Trojan Horse
Trojan viruses are disguised as helpful software programs. However, once the user downloads it, the Trojan virus can gain access to sensitive data and then modify, block, or delete the data. This can be extremely harmful to the performance of the device. Trojan viruses are not designed to self-replicate.
Spyware
Spyware is malicious software that runs secretly on the victim's computer while reporting back to a remote device used by the criminal. Rather than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators. Spyware is often used to steal financial or personal information. A specific type of spyware is a keylogger, which records your keystrokes to reveal passwords and personal information.
Adware
Adware is malicious software used to collect data on your computer usage and provide appropriate advertisements to you. While adware is not always dangerous, in some cases adware can cause issues for your system. Adware can redirect your browser to unsafe sites, and it can even contain Trojan horses and spyware. Additionally, significant levels of adware can slow down your system noticeably. Because not all adware is malicious, it is important to have protection that constantly and intelligently scans these programs.