Malware Definition

Posted by Ibnu Siham

ADWARE

software that enables displaying banner advertisements when the program is running. Adware may register your Internet behaviour, and is often mentioned in connection with Spyware, because both may register and report user information to a third party.

BACKDOOR

A program that installs itself in such a way that the infected computer can be accessed and controlled remotely.

DIALER

A dialer is an electronic device that is connected to a telephone line to monitor the dialed numbers and alter them to seamlessly provide services that otherwise require lengthy access codes to be dialed.

KEYLOGGER

Keyloggers are normally used as spyware. They are programs, which log the keys pressed on a keyboard and send this to a third party through a communication channel. Keyloggers may be used e.g. for stealing passwords.

MALWARE

The word malware derives from the term malicious software, and is a common name for all software designed to infiltrate or damage a computer system without the owner's informed consent.

Computer viruses, worms, trojans, keyloggers etc. are all different kinds of malware.

PHISING

The word phishing is derived from fishing. It is used to decribe attacks where someone attempts to get your personal information, like passwords, credit card numbers, bank account numbers etc.

ROOTKIT

Rootkits are software used to hide files, running processes, Registry entries, or other kinds of data. Although a rootkit may be used for legitimate purposes, it is a fact that this technology is often used by authors of malicious software to hide the malware they try to distribute.

SPAM

Spam is not malicious software in its pure sence. Spam is unsolicited information, and may perhaps be called "nuisanceware". The most common channel for SPAM is email, although any communication channel may be used (web, Instant messaging etc.). It is estimated that email-based SPAM constitutes far more than 50% of all email traffic through the Internet.

SPYWARE

Spyware is programs that collect information about a person or an organization without that entity's consent and awareness.

TROJAN

A program that seems to be genuine and even useful, and thereby tricks the users to install/use it.

VIRUS

A virus is designed to copy itself and propagate from one computer file to another, usually by attaching itself to program files.

VULNERABILITY

A flaw in a computer program, which may allow someone to perform action(s) not intended by the author of the program.

WORM

A worm will infect other computers. A network worm will also spread automatically in a network and is independent on human interaction.


Thus, worms are faster spreaders than viruses. Normally worms will neither delete nor change files. However, they may be loaded into computer memory, and thereby result in slower computer performance.


source : www.norman.com

{ 0 comments... read them below or add one }

Post a Comment

Related Posts with Thumbnails