Malware
What is malware and how can we prevent it?
Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner. There are various types of malware, including spyware, ransomware, viruses, worms, Trojan horses, adware, or any type of malicious code that infiltrates a computer.
Generally, software is considered malware based on the intent of the creator rather than its actual features. Malware creation is on the rise due to money that can be made through organized Internet crime. Originally malware was created for experiments and pranks, but eventually it was used for vandalism and destruction of targeted machines. Today, much of malware is created to make a profit from forced advertising (adware), stealing sensitive information (spyware), spreading email spam or child pornography (zombie computers), or extorting money (ransomware).
Various factors can make computers more vulnerable to malware attacks, including defects in the operating system (OS) design, all of the computers on a network running the same OS, giving users too many permissions, or just because a computer runs on a particular operating system, such as Windows, for example.
The best protection from malware — whether ransomware, bots, browser hijackers, or other malicious software — continues to be the usual, preventive advice: be careful about what email attachments you open, be cautious when surfing by staying away from suspicious websites, and install and maintain an updated, quality antivirus program.
-
4 things to do if your email account is hacked
Learn what to do if your email account has been hacked so you can stop scammers from targeting your contact list with money scams, malware, and more.
-
5 ways you didn't know you could get a virus, malware, or your social account hacked
October is National Cyber Security Awareness month. This is part 1 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on todays Internet...
-
7 tips to prevent ransomware
Ransomware extorts money from victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking someone into installing it. It typically scores high profile victims like hospitals, public schools and police departments.
-
9 simple webcam security tips to deter hackers
Most devices have a camera these days. So we’re sharing nine easy ways to increase your webcam security and keep yourself safe.
-
Android malware
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again.
-
Apple cyber security predictions for 2017
The Apple threat landscape was extremely busy in 2016. We reported on seven major stories in 2016.
-
Can iPads get viruses?
There are no known, common viruses that can attack an iPad, but other threats such as adware, malware and spyware exist. These typically find their way onto your iPad through fake ads, attachments from untrusted sources, phishing attempts, or other nefarious paths into your device.
-
Do Macs get viruses and malware?
Apple computers can get viruses and malware just like PCs can. While iMacs, MacBooks, Mac Minis, and iPhones may not be as frequent targets as Windows computers, all have their fair share of threats.
-
Everything you need to know about macro viruses
A macro virus is a computer virus written in the same macro language that is used for software applications, such as word processing programs. When an infected file is opened, the macro virus releases a sequence of actions that begin automatically. These actions cause damage to the computer and its applications.
-
How can I tell if my phone has been hacked?
Is my phone hacked? It’s a worry that may cross your mind if your phone is behaving strangely. We’re sharing the telltale signs of a hacked phone, and what to do if you think your phone has been compromised.
-
How to remove a virus from an Android phone
Wonder whether your Android phone is harboring a virus or other malware? Learn how to detect and remove it.
-
How to remove malware from a Mac or PC
If left unaddressed, malware can wreak havoc on your computer and the personal data you store on it. Here are the six steps required to remove malware from your Mac or PC.
-
How to tell if you may have malware and what features to look for in strong malware protection
Malware refers to programs specifically engineered to compromise computers or other devices. It can present itself in many forms such as viruses, Trojan horses, worms, adware, ransomware and spyware. All forms of malware are designed to compromise the safety of your devices and the data stored on them.
-
IP spoofing: What is it and how does it work?
IP spoofing allows cybercriminals to infect your computer with malware, steal your sensitive data, and crash your server, often without detection.
-
Intrusion prevention system (IPS): Your first line of defense against malware
Intrusion Prevention System (IPS): Your first line of defense against malware
-
Malvertising: What is it and how to avoid it
Malvertising can infect your computer with malicious software even when visiting legitimate sites. Here’s how.
-
Malware 101: How do I get malware? Simple attacks
We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer?
-
Malware attacks: What you need to know
Malware is software that cyber attackers develop to gain access or cause damage to a computer or network, usually without the victim’s knowledge. Different types of malware include viruses, spyware, ransomware, and Trojan horses. Malware attacks can occur on all sorts of devices and operating systems, including Microsoft Windows, macOS, Android, and iOS.
-
OS X malware
Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
-
Safely and securely use memory sticks
You may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true, they are susceptible to being exploited like everything else…
-
The worm in the Apple, Part 1: Why Mac users are not immune from viruses and malware
A few years ago, I worked in an Apple Store Genius Bar. The first thing that caught my attention was the number of customers coming in with malware issues. If I had a nickel for every time I heard...
-
What are bots?
Bots, or internet robots, are also known as spiders, crawlers, and web bots. Malware bots are defined as self-propagating malware that infects its host. Malware is delivered in download format via social media or email messages that advise clicking a link.
-
What are browser hijackers?
A browser hijacker is defined as a “form of unwanted software that modifies a web browser’s settings without the user’s permission.” The idea is to make users visit certain websites whether they want to or not so the hijacker enjoys higher advertising revenue. Browser hijackers may also contain spyware to obtain banking information and other sensitive data.
-
What are malicious websites?
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
-
What is a PUA (Potentially Unwanted Application) or PUP (Potentially Unwanted Program)?
Potentially Unwanted Applications (PUAs) are unwanted software programs that come bundled in legitimate free software programs as a package.
-
What is a Trojan downloader?
A Trojan downloader is a type of Trojan horse that downloads and installs files, often malicious programs.
-
What is a Trojan? Is it a virus or is it malware?
Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
-
What is a botnet?
Botnet is a string of connected computers coordinated together to perform a task. Botnets are just one of the many perils out there on the Internet. Here's how they work and how you can protect yourself.
-
What is a computer virus?
A computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
-
What is a computer worm, and how does it work?
A computer worm is a type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction and does not need to attach itself to a software program in order to cause damage. Worms can be transmitted via software vulnerabilities.
-
What is a keylogger and how do I protect myself against one?
A keylogger is spyware that can records your keystrokes. The data captured can be sensitive information that’s used to commit fraud or identity theft.
-
What is a rootkit? And how to stop them
Rootkits are a type of malware that are designed so that they can remain hidden on your computer. But while you might not notice them, they are active. They give cybercriminals the ability to remotely control your computer and steal your credit card or online banking information.
-
What is antivirus software? Antivirus definition
Antivirus software searches for known threats and monitors the behavior of all programs. It seeks to block or remove malware as quickly as possible. If you don’t have antivirus software installed, you could be at risk of picking up a virus.
-
What is cyber security? What you need to know
Cyberattacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. A strong cyber security system has multiple layers of protection spread across computers, devices, networks and programs.
-
What is fileless malware and how does it work?
Fileless malware uses your system’s software, applications and protocols to install and execute malicious activities. Learn more.
-
What is ransomware and how to help prevent ransomware attacks
Ransomware is a form of malicious software that locks and encrypts a victim’s computer or device data, then demands a ransom to restore access. In many cases, the victim must pay the cybercriminal within a set amount of time or risk losing access forever. If the attackers don’t give you the decryption key, you may be unable to regain access to your data or device.
-
What is spear phishing?
Being the victim of a cybercrime can be invasive and annoying. Read our guide to identifying spear phishing and keeping yourself safer.
-
When Were Computer Viruses First Written, and What Were Their Original Purposes?
Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer...
-
Why Mac users are not immune from viruses and malware
I worked in an Apple Store Genius Bar. The first thing that caught my attention was the number of customers coming in with malware issues.
-
Online Scams
In this section learn about scams that cybercriminals use to steal information and commit identity theft. Read articles on how to spot and prevent online scams.
-
Kids' Safety
With the right information at your fingertips, you can make better decisions for your child’s cyber safety. Read articles about online security for your family.