wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Malicious softwares

profile
Abhishek Panchal
Jul 12, 2023
0 Likes
0 Discussions
25 Reads

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way.Depending on the type of malware and its goal, this harm may present itself differently to the user or endpoint. In some cases, the effect malware has is relatively mild and benign, and in others, it can be disastrous.No matter the method, all types of malware are designed to exploit devices at the expense of the user and to the benefit of the hacker -- the person who has designed and/or deployed the malware.

Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions and monitor end users' computer activity.

Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive, through popular collaboration tools and by drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge.


Comments ()


Sign in

Read Next

Deadlocks

Blog banner

Cyber Laws In India and Around the World

Blog banner

Telegram and it's features

Blog banner

Android Flashlight Application

Blog banner

1.1 basic elements

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Synchronization

Blog banner

Top 10 Logos and their meanings

Blog banner

HubSpot

Blog banner

IOT- Internet Of Things

Blog banner

Deadlock in Operating System

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

'Positivity in life'

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

(Input/Output) in os

Blog banner

Routers

Blog banner

The Golden Temple , Amritsar

Blog banner

Modern operating system

Blog banner

Process Description

Blog banner

Memory heirachy (Operating system)

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Blockchain

Blog banner

Virtual Memory

Blog banner

Trello ( management software)

Blog banner

The most common internet security threats

Blog banner

File management

Blog banner

Crypto tax evasion

Blog banner

GraphQL

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

File management

Blog banner

IT service level agreement

Blog banner

Layers Of Blockchain

Blog banner

The Memory Hierarchy

Blog banner

Embedded Operating System

Blog banner

Why we should do reading

Blog banner

This is my first blog.

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Memory Management

Blog banner

Evolution of Operating system.

Blog banner

Steganography and Steganalysis

Blog banner

Incident management in ITSM

Blog banner