Malware has been a threat to individuals and organizations since the beginning of the 1970s when the Creeper virus first appeared. Since then, our planet has been under fire from thousands of different malicious software(malware) variants, all with the intent of causing the foremost disruption and damage as possible. Malware does not physically damage the hardware.
Malware has found several methods of attack. They include email attachments, malicious advertisements on popular sites (malvertising), fake software installations, infected USB drives, infected apps, phishing emails, and even text messages.
Malware comprises of all types of malicious software, including viruses, and cybercriminals use it for many reasons, such as:
- For financial gain, where it leads to the user of the code to gain money through stealing, scamming, advertising, or ransoming
- For intellectual gain, which leads to the release of information (such as passwords, blackmail, or top-secret info) to the user of the malware or the public
- For someone to see their capabilities by watching how far their code can go
white hat and Black hat hackers
Browser Highjacking? Most browser hijacking is relatively easy to get rid of
What is browser hijacking It is a form of unwanted software that modifies a web…
Macro Virus. How Does it Work? Protection and Preventive Measures
Micro Virus-Social media virus You have just opened inbox and find mail from friends with…
Computer Stealth Virus, a rebel who disguise to remain unidentifiable
Computer Stealth Virus A stealth virus is a kind of malware that does everything to avoid detection…
Non-Resident Virus, A direct action file infector virus but still not dangerous
Non-Resident Virus and other computer Viruses What could be better than receiving an email with…
Resident virus,installs code in memory which infects future programs
Resident Virus and other Malicious Programs Virus is a program written to enter to your…
Polymorphic Virus,Change signature each time they spread or infect
Polymorphic virus-Can damage registries or act as a Trojan Imagine having a key that changes…
Parasitic virus,Hacks the operating system rights
Parasitic Virus-attacks host program A computer works by executing sets of consecutive instructions called programs.As…
Multipartite Virus,tricky and hard to remove
Multipartite Virus There are many types of viruses, some cause harmless but some cause devastating.…
Logic Bomb,dormant until conditions are met
logic bomb-story behind it A programmer at a large corporation who engineered this type of…
Carding more than just a headache for merchants
What is Carding ? Consumers and retailers prefer credit cards as a convenient way to…
Card-not-present transaction fastest growing payment and fraud segments
Card-not-present transaction EMV chips made credit and debit cards safer, but unfortunately, the built-in security…
Spoofing of 7 types to loot your credit card
Spoofing not a joke The term “spoofing” might have a comic implication in some contexts,…
credit card theft by hackers
Credit Card Theft Digitally fund transfers and online shopping is the common way of making…
Encrypted virus, the evolution of new techniques for the virus.
Encrypted virus From the very early days, virus writers tried to implement virus code evolution. One…
Paying hacker is no bad thing,it is reward
Why do hackers hack What do they get from doing damage? Is it just about money?…
Potentially Unwanted Applications, Malicious software authors shift
Potentially Unwanted Applications-not a virus Malicious software authors have shifted their focus from illegal and…
Direct action Virus,file-infecting,non-resident weak virus
Direct action virus A virus is usually designed to execute when it is loaded into…
Companion Virus Amazing computer virus with zero bit change
Companion virus? A type of intrusive malware that replicates itself and inserts copies of itself…
Browser hijacker (PUA) a nuisance and danger for financial security
History of Browser hijacker It is believed that browser hijackers (Type of Virus) may have…
Backdoor virus a burglar of all times
Top 10 Computer Malware- nuisance world of bad guys Backdoor Virus-Defined In Softwares, secret backdoor (remote…