Transcript for:
Malware Types and Prevention

one constant challenge we have both at home and in our offices is the threat of malware malware is a broad term that describes many different types of malicious software that can cause problems steal data and effectively disrupt your entire computer sometimes these are capturing information that you're typing in or capturing images from your webcam there might be multiple computers infected with malware and they're all working together as one bot perhaps this malware is really designed just to show you advertising so it's making money for the attacker or the author of The malware and there may be viruses and worms that are able to replicate themselves either with your help or without your help and infect other devices that may be on your network a generic term for malware that uses humans to replicate and spread is called a virus this is a very broad term that is used to describe many different types of malware but one common trait with viruses is that it requires human intervention to be able to replicate itself from one machine to another this is different than malware that's delivered as a worm a worm is malware that's able to replicate itself from one computer to another but it's able to do it without any type of human intervention for that reason worms are considered to be much more dangerous than a viruses with a virus we can simply choose not to click on a particular link with a worm that mware can replicate itself without any type of human intervention ransomware is a category of malware that gets on a system and begins encrypting all of your personal data The Ransom part of ransomware is that they will give you the decryption key but you'll have to pay for it very often you're sending cryptocurrency or some other type of currency to the attacker and they're providing you with a key that you can then use to unlock your system you're effectively having to pay the ransom to get get your data back a trojan horse is malware that gets on your system by pretending that it's something else you could be presented with an executable that says it's a game when you click that executable it is installing software that does appear to be a game but behind the scenes there is malware that's infecting your system a rootkit is malware that's able to hide within your operating system itself this means it's very difficult to detect because it's part of your operating system itself it's also very difficult to eradicate when key loggers infect a system they're going to record every key that you press this is especially important during the login process where this key logger will record your username and your password it will then send that information to the attacker and now they have access to the same systems that you do adwar and spyware is especially good at presenting you with advertisements on your screen and that advertisement is making money for the malware author although bloatware is not directly malicious it is software that does cause problems on your system bloatware is software that's usually pre-loaded on a system and often it's software that you'll never use if this bloatware takes up space on your storage drive and often it has processes that are actively running in the memory of your system if you were to remove this bloatware you would free up those resources for legitimate applications and logic bombs are especially good at waiting for a particular event to occur and then they execute often this is a time of day or a day of the week and when that particular time or date is reached the malware begins to execute on your system very often multiple types of malware are working together to infect your system here's a very common scenario where a worm might take advantage of a vulnerability that's on your system because you did not update to the latest series of security patches once that worm Finds Its way onto your system it then embeds some malware in the form of a remote access back door which then allows anything to gain access to your system from that particular malware author and often they will install a bot on your system where they're now able to view and control your computer remotely for any of this to work there has to be some executable that runs on your system with a worm that executable can run automatically but very often that executable needs you as as a human to be able to click on something that's why we often say as a best practice you should never click a link that's embedded within an email on your system you might also see popups appear from a website that entice you into clicking those those might also run an executable and you also have driveby downloads that may download an executable onto your system without you having to click anything on a particular web page and as we've already mentioned worms can move from machine to machine without you click anything fortunately worms are relatively rare and it's very unusual to find one that can move from system to system this is why you constantly hear of the best practice of keeping your system up to date with the latest security patches if your system has closed those holes and there are no vulnerabilities in your operating system you can prevent this malware from embedding itself into your system and of course the same thing applies to the applications that are running on your system make sure that not only the operating system is updated but all of your applications as well ultimately the malware authors want to somehow make money from your system and occasionally they will make that money by taking your data ransomware is a good example of this because with ransomware your personal data is very valuable to you and if someone was to encrypt all of this information you could be enticed to provide them with the ransom to be able to get your data back if ransomware hits system at work the stakes are a little different there may be planning documents for the company there could be employee details and personally identifiable information or pii or there might be private information and financial details that the company does not want to make public to others there is usually a number associated with the value of this information and it's not unusual for organizations and individuals to work with the malware authors to provide them with the ransom they're looking for in exchange for your data