wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Malicious softwares

profile
Abhishek Panchal
Jul 12, 2023
0 Likes
0 Discussions
25 Reads

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way.Depending on the type of malware and its goal, this harm may present itself differently to the user or endpoint. In some cases, the effect malware has is relatively mild and benign, and in others, it can be disastrous.No matter the method, all types of malware are designed to exploit devices at the expense of the user and to the benefit of the hacker -- the person who has designed and/or deployed the malware.

Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions and monitor end users' computer activity.

Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive, through popular collaboration tools and by drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge.


Comments ()


Sign in

Read Next

Rapido

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Social Media Marketing Trends 2022

Blog banner

Data Warehouse Bus Matrix

Blog banner

Every body is beautiful

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

10 Unknown facts about India's Independence

Blog banner

operating system

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Explain website hacking issues

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

My 1stNull Puliya session

Blog banner

What type of stock broker do I need?

Blog banner

Ambiguous

Blog banner

Memory management

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Theads

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Embedding a Youtube video on Wisemonkeys

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Starting Android Activity Using Intent

Blog banner

Raid

Blog banner

Cyber Forensics

Blog banner

10 Interesting Facts about Death Note

Blog banner

Modern Operating System

Blog banner

Virtual Machine

Blog banner

Deadlock

Blog banner

Assignment-3

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Cache memory

Blog banner

Operating system evolution

Blog banner

gis substation

Blog banner

OLA

Blog banner

ODOO

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Amazon

Blog banner

Evolution of Operating System

Blog banner

Water Resources are about to exhaust...

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Cache memory

Blog banner

CRISP-DM Methodology

Blog banner