• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Wooster

Technology@​Wooster

Collaborating with the campus community to explore questions of​ pedagogy, best practices, and technology integration.

  • For Students
    • What Technology do I need at Wooster
    • Computer Labs
    • Downloads
    • Wireless
    • Printing
    • E-Mail
    • Gaming Consoles
    • Poster Printing
  • I’d like to
  • Events
  • Staff
    • Applications Development
    • Educational Technology
      • About
    • Information and Planning
    • Research and Planning
    • Technology Services
      • Digital Infrastructure
      • Media and Event Support
      • Technology Services – Media Services
      • Technology Services – Service Desk
    • Student Digital Media Assistants
    • Student Research Assistants
    • Student Technology Assistants
  • Resources
    • ArcGIS Online
    • Hoonuit online training
    • Moodle
    • Professional Development
    • Projects in a Box
    • Qualtrics
    • Select Survey
    • WordPress(Voices)
    • Workshops
  • Technologies
    • Classroom Technology
      • Document Cameras
      • Epson Technologies
      • SMART Technologies
      • Student Response Systems
      • Video Conferencing
    • Digital Media
      • Audio
      • Images
      • Mobile Apps
      • Presentation
      • Video
    • Virtual Reality
      • VR Resources
      • Virtual Worlds
    • Web 2.0
      • Information Management
      • Mashups
      • Media Sharing
      • Social Communication
      • Social Knowledge Building
    • Web Authoring
      • Blogging
      • CMS
      • Wikis
  • Contact Us
    • Ed Tech Consultation
    • Tech Services Consultation
  • Change Your Password
  • Spam & Junk Email
  • IT Policies
  • IT Blog
You are here: Home → Cybersecurity → What is Malware?

What is Malware?

Photo by Markus Spiske on Unsplash

What is Malware?

Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent. 

Not all malware is destructive, though it can cause annoying behaviors such as generating an abundance of pop-up ads or cause your computer to run slowly. In addition to this, it can also steal data. 

What are some types of Malware? 

Viruses

Viruses infect program files and/or personal files. They are a malicious code or program written to change the way a computer works and is designed to spread from one computer to another. 

Adware 

Adware is software that shows unwanted advertising on a computer or mobile device in the form of pop-up ads or redirecting your browser to a specific website. Adware does not cause any direct harm to a user’s device: however, it can produce bothersome behaviors and can sometimes have spyware. 

Spyware 

Spyware hides on your computer and monitors everything that you do. It can track web activity, access emails, and steal username and password information.  

Browser Hijacker 

Browser hijacking is when malicious software redirects your computer’s browser to a designated website. It is typically used to display advertising, but it can also be used to generate visits to a particular website or lead you to a malicious website that downloads malware onto your computer. 

Bots 

Bots are an application that carries out the automated task on a user’s computer. An example would be an attack on other machines to create a botnet. When a bot infects a computer, the computer is referred to as a “zombie,” because it is now under the control of the hacker. Some of the uses of botnets are for distributing spam, injecting adware onto other computers, recruiting other computers for Denial of Service (DoS) attacks, and more. 

Trojan Horses 

Trojan Horses can cause severe harm to data such as deletion, modification, copying, stealing, and disruption of network activity. The malware is named Trojan Horse because it hides malware in a normal file. This is a reference to the Greek tale of the use of a wooden horse used to fool the defenders of Troy into allowing the hidden soldiers into their city during the Trojan Wars. 

 Ransomware 

Ransomware is a high-level threat, as it holds the data on your computer hostage via file encryption, which often demands a fee to regain access to the data. Never pay the fee requested by the attacker to unlock your data. Instead, do regular backups, and if infected, restore your computer from your most recent backup. In the event that this occurs to your computer, please reach out to the Help Desk.  

Worms

A computer worm spreads as many copies of itself from computer to computer. A worm can replicate itself without any human interference and does not need to attach itself to a program to cause damage. Worms can change, delete files, and inject more malware onto the computer. 

How can you protect yourself from Malware? 

The best way to avoid malware is to keep your devices healthy and up to date. Critically, you can help to prevent malware from reaching your computer by installing an antivirus/anti–malware program. You make sure to configure it to constantly scan for signs of malicious activity in downloads and active files. Some recommended antivirus/anti-malware programs included Sophos, Bitdefender, and Malware Bytes. If you have questions about antivirus/anti-malware programs, please reach out to the Help Desk. 

Sources:

https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html 

https://community.norton.com/en/blogs/norton-protection-blog/malware-101-what-malware 

https://www.lifewire.com/what-is-malware-2625933 

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to print (Opens in new window)

Related

Filed Under: Cybersecurity

Primary Sidebar

Interesting Videos

Resources

  • We can help with…
  • Professional Development
  • Projects in a Box
  • Workshops
  • I.S. Support
  • Request an Appointment
  • ArcGIS Online
  • Hoonuit online training
  • Qualtrics
  • Poster Printing
  • Request a Wiki
  • Loaner Equipment

Copyright © 2021 · Technology Theme 3.0.0 on Genesis Framework · WordPress · Log in

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkNo
You can revoke your consent any time using the Revoke consent button.Revoke cookies