wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Malicious softwares

profile
Abhishek Panchal
Jul 12, 2023
0 Likes
0 Discussions
25 Reads

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way.Depending on the type of malware and its goal, this harm may present itself differently to the user or endpoint. In some cases, the effect malware has is relatively mild and benign, and in others, it can be disastrous.No matter the method, all types of malware are designed to exploit devices at the expense of the user and to the benefit of the hacker -- the person who has designed and/or deployed the malware.

Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions and monitor end users' computer activity.

Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive, through popular collaboration tools and by drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge.


Comments ()


Sign in

Read Next

10 Interesting Facts about Death Note

Blog banner

Mendeley (management software)

Blog banner

Satellite Based Positioning

Blog banner

Reconnaissance

Blog banner

Device driver

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Virtual Machine

Blog banner

Social engineering in cyber security

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Raid

Blog banner

Process in OS

Blog banner

VPN

Blog banner

Social Media Sentiment Analysis

Blog banner

Android Flashlight Application

Blog banner

Decision Tree: A Diagram Model

Blog banner

Blog name

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

SQL Injection practice on DVWA

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

LIFEHACKER

Blog banner

Outlook.com

Blog banner

NodeJs

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Health and fitness

Blog banner

E-mail security

Blog banner

Memory Management

Blog banner

Big Data Architecture

Blog banner

Privacy LAWs in IT

Blog banner

Brain wash of social media

Blog banner

Student Grade Calculator in LISP

Blog banner

Interrupts in operating system.

Blog banner

All you need to know about Website Traffic

Blog banner

Modern operating system

Blog banner

E-learning in today's world

Blog banner

Importance of Network Security Risk

Blog banner

Busted : Common Web Security Myths

Blog banner

Virtual memory in windows

Blog banner

Synchronization

Blog banner

Direct Memory Access

Blog banner

10 Survival Tips that might save your life

Blog banner