Malware
What is malware and how can we prevent it?
Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner. There are various types of malware, including spyware, ransomware, viruses, worms, Trojan horses, adware, or any type of malicious code that infiltrates a computer.
Generally, software is considered malware based on the intent of the creator rather than its actual features. Malware creation is on the rise due to money that can be made through organized Internet crime. Originally malware was created for experiments and pranks, but eventually it was used for vandalism and destruction of targeted machines. Today, much of malware is created to make a profit from forced advertising (adware), stealing sensitive information (spyware), spreading email spam or child pornography (zombie computers), or extorting money (ransomware).
Various factors can make computers more vulnerable to malware attacks, including defects in the operating system (OS) design, all of the computers on a network running the same OS, giving users too many permissions, or just because a computer runs on a particular operating system, such as Windows, for example.
The best protection from malware — whether ransomware, bots, browser hijackers, or other malicious software — continues to be the usual, preventive advice: be careful about what email attachments you open, be cautious when surfing by staying away from suspicious websites, and install and maintain an updated, quality antivirus program.
-
5 ways you didn't know you could get a virus, malware, or your social account hacked
Read MoreOctober is National Cyber Security Awareness month. This is part 1 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on todays Internet...
-
7 tips to prevent ransomware
Read MoreMalicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.
-
Android malware
Read MoreThe security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again.
-
Apple cyber security predictions for 2017
Read MoreThe Apple threat landscape was extremely busy in 2016. We reported on seven major stories in 2016.
-
Can iPads get viruses?
Read MoreYour iPad may be safe from viruses, but it can still be vulnerable to a host of other problems. Here’s what you can do to help avoid them.
-
Cybercrime rings: Gameover Zeus
Read MoreThis week the UK National Crime Agency and the FBI, working with Symantec and other partners, were able to significantly disrupt two cybercrime operations: Gameover Zeus botnet and Cryptolocker ransomware network…
-
Do Macs get viruses and malware?
Read MoreA macro virus is a computer virus written in the same macro language that is used for software applications, such as word processors.
-
Everything you need to know about macro viruses
Read MoreA macro virus is a computer virus written in the same macro language that is used for software applications, such as word processors.
-
How to remove a virus from an Android phone
Read MoreWonder whether your Android phone is harboring a virus or other malware? Learn how to detect and remove it.
-
How to remove malware from your PC or Mac
Read MoreCybercriminals use malware to steal passwords, credit card info and more for profit. Learn how to remove malware with this guide.
-
How to secure your webcam and help prevent webcam hacking
Read MoreHow to secure your webcam and help prevent webcam hacking
-
How to tell if you may have malware and what features to look for in strong malware protection
Read MoreThe term malware is short for malicious software and refers to programs specifically engineered to compromise computers or other devices.
-
Intrusion prevention system (IPS): Your first line of defense against malware
Read MoreIntrusion Prevention System (IPS): Your first line of defense against malware
-
Malvertising: What is it and how to avoid it
Read MoreMalvertising can infect your computer with malicious software even when visiting legitimate sites. Here’s how.
-
Malware 101: How do I get malware? Simple attacks
Read MoreWe’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer?
-
Malware attacks: What you need to know
Read MoreMalware is a threat to your devices and your cybersecurity. Here’s what you need to know.
-
OS X malware
Read MoreOnline threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
-
Safely and securely use memory sticks
Read MoreYou may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true, they are susceptible to being exploited like everything else…
-
The worm in the Apple, Part 1: Why Mac users are not immune from viruses and malware
Read MoreA few years ago, I worked in an Apple Store Genius Bar. The first thing that caught my attention was the number of customers coming in with malware issues. If I had a nickel for every time I heard...
-
What are bots?
Read MoreBots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of...
-
What are browser hijackers?
Read MoreA browser hijacker is defined as a form of unwanted software that modifies a web browsers settings without the users permission. The result is the placement of unwanted advertising into the...
-
What are malicious websites?
Read MoreMost people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
-
What is a PUA (Potentially Unwanted Application) or PUP (Potentially Unwanted Program)?
Read MorePotentially Unwanted Applications (PUAs) are unwanted software programs that come bundled in legitimate free software programs as a package.
-
What is a Trojan downloader?
Read MoreA Trojan downloader is a type of Trojan horse that downloads and installs files, often malicious programs.
-
What is a Trojan? Is it a virus or is it malware?
Read MoreWhether you call it Trojan malware or a Trojan virus, it’s malicious code. Here’s what you need to know.
-
What is a botnet?
Read MoreThe Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.
-
-
What is a computer worm, and how does it work?
Read MoreA computer worm is a type of malicious software that spreads copies of itself from computer to computer.
-
What is a keylogger and how does it work?
Read MoreKeyloggers can gain access to everything you type on your computer. Here’s what you need to know.x
-
What is a rootkit? And how to stop them
Read MoreRootkits are a type of malware that are designed so that they can remain hidden on your computer. Find out more.
-
What is antivirus software? Antivirus definition
Read MoreAntivirus protection is essential, given the array of cyberthreats. Learn why.
-
What is cryptojacking? How it works and how to help prevent it
Read MoreCryptojacking is the unauthorized use of your computer and devices by cybercriminals in order to mine for cryptocurrency.
-
What is cyber security? What you need to know
Read MoreCyber security is the state or process of protecting networks, devices, and programs from any type of cyberattack. Cyber security starts with users having good cyberthreat defense education.
-
What is fileless malware and how does it work?
Read MoreFileless malware uses your system’s software, applications and protocols to install and execute malicious activities. Learn more.
-
What is ransomware and how to help prevent ransomware attacks
Read MoreRansomware holds your personal files hostage, keeping you from your documents, photos, and financial information.
-
-
When Were Computer Viruses First Written, and What Were Their Original Purposes?
Read MoreModern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer...
-
Why Mac users are not immune from viruses and malware
Read MoreI worked in an Apple Store Genius Bar. The first thing that caught my attention was the number of customers coming in with malware issues.
-
Online Scams
Read MoreIn this section learn about scams that cybercriminals use to steal information and commit identity theft. Read articles on how to spot and prevent online scams.
-
Kids' Safety
Read MoreWith the right information at your fingertips, you can make better decisions for your child’s cyber safety. Read articles about online security for your family.