wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Malicious softwares

profile
Abhishek Panchal
Jul 12, 2023
0 Likes
0 Discussions
25 Reads

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way.Depending on the type of malware and its goal, this harm may present itself differently to the user or endpoint. In some cases, the effect malware has is relatively mild and benign, and in others, it can be disastrous.No matter the method, all types of malware are designed to exploit devices at the expense of the user and to the benefit of the hacker -- the person who has designed and/or deployed the malware.

Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions and monitor end users' computer activity.

Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive, through popular collaboration tools and by drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge.


Comments ()


Sign in

Read Next

10 Things To Do On Valentine's Day If You're Single

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Modern operating system

Blog banner

Disk cache

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

LINUX

Blog banner

GIS Bharat Maps

Blog banner

15 Interesting Facts about India

Blog banner

Virtual Machine

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

My Favorite Sportsperson

Blog banner

HubSpot

Blog banner

Virus

Blog banner

Understanding E-mail Servers

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

The Peephole

Blog banner

Smartsheet

Blog banner

Deadlock and Starvation

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

CSI and Organizational Change

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

virtual machine

Blog banner

Product Discount Calculator

Blog banner

Python as a tool for data analysis

Blog banner

E-Governance

Blog banner

Process states

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Wiretapping

Blog banner

Google classroom

Blog banner

Review on Recovering Deleted Files

Blog banner

The launch of UniMap by HERE

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Mail merge

Blog banner

Virtual Machine

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Vulnerability Assessment

Blog banner

Fault Tolerance in an Operating System

Blog banner

Memory Management in Operating System

Blog banner

VIRTUAL MACHINE

Blog banner

OS- Assignnment 1

Blog banner

Importance Of Time

Blog banner

Threads

Blog banner