What is malware? Technology Gyan

 Nowadays, in the new era of technology, we all use other devices like computers, laptops and smartphones and you must have heard the name of virus or malware attack coming in these devices through internet.


If this malware enters your computer system in some way, then it slows down or hangs the performance of the computer and many dangerous problems like computer data loss and system crashes can occur with your computer.

what is malware

Malware is a prefix of "Mal" in Spanish language, which means "bad" or bad or bad word in Hindi hence it is also called "badware", which is also a good way to remember it.

The full-form of Malware is Malicious Software. It is an abbreviation of a small file or code of software program that enters your computer without permission, with the purpose of preventing the performance of the computer or computer system and stealing or damaging the data contained in it.

In the present time, people search the internet every day to get some information, due to which there is a high risk of virus or malware entering their computer system. Malware can enter the computer system through online in many ways.

For example- Malware in your computer system by downloading something on a malicious website or clicking on any advertisement, downloading pirated software, movies/songs or games from untrusted website and opening links of unknown e-mail attachments. can come.

Here it is, about how online malware can come in the computer, now let's see how offline malware can come in the computer.

Often we use Pendrive, Hard Drive, CDs, DVDs or any removable storage in our computer. When we bring these things from any other place and use these things to take or give data to our computer, then through all these things also malware can come into our computer and can destroy the computer's data or file.

Types of Malware

There are many types of malware found, some of which include other types of malware like Virus with some popular Trojons horse, Computer Worms, Spyware, Adware, Ransomware and software, which are as follows.

  1. Computer Worms
  2. Trojons Horse
  3. Virus
  4. spyware
  5. Adware
  6. ransomware
  7. Rootkits
  8. Backdoor

Computer Worms

This is a type of malicious program. This type of malware spreads very fast in the computer to reach from one system to another through the network like usb drive, media storage, hard drive or email etc. and it becomes active as soon as the computer goes.

It deletes the data files present in the computer. Often worms slow down the speed of the computer by occupying the Random Access Memory (RAM) of your computer, due to which the computer hangs.

Trojans Horse

Trojon Horse is also a kind of software program that initially promises to be a useful and secure software, when you use it in your computer, it fraudulently comes into your computer, it saves files and hard disk storage. Harms and transmits personal or sensitive information on your computer to the wrong people.

Most such malware comes mostly through using the Internet without anti-virus and installing free anti-virus or other software from the Internet.

Computer Virus

Computer Virus is a type of software program code that enters any computer and binds it to the working system of that device. It replicates itself and infects the computer by reaching the computer without the user knowing it.

Generally computer virus damages the hard disk by going to the boot sector of the hard disk of the computer. It slowly spreads in the memory of the user's device and damages the device, making it very difficult to recover the lost data once the virus spreads in the system.

spyware

Spyware is also a type of software that is used to collect information about a user by installing software on their computer without knowing them.

Usually the presence of spyware in the computer is hidden from the users so as to secretly monitor the other user.

Spyware monitors your internet surfing activities and can also redirect you to a different infected website when you open a website url on your web browser.

Adware

Adware is also a software application or program. It displays advertising banners on your computer without the need. These advertisements appear on the user interface of a website or software application via pop-up window, banner display, video display or full screen display. Although adware is similar to spyware, it does not install any software on the user's computer.

Adware monitors the surfing activity of the user's browser, so that it knows which advertisements to show to the user. Adware can redirect user's browser search to webpages that contain a lot of product advertisements. It is commonly found on mobile devices other than computers.

ransomware

Ransomware is a kind of advanced malware which is the most dangerous, it is also known as Scareware. This malware can block the screen of your computer or Android device and can even encrypt data files on your devices and threaten to delete them and in return can threaten the computer user and demand a ransom of money.

Most ransomware Trojans look like malware and are spread through social engineering. Ransomware malware is used to commit financial fraud or to extort money from computer users by using ransomware malware.

Rootkits Malware

A rootkit is malware that is designed to gain access to a computer system. Once Rootkit Malware is installed in one's system, it gains access or complete control of the computer, is able to modify or destroy the existing data files, modify the software as well as steal other information from the computer. And

Rootkits can install automatic software after hackers gain root access to the system, which collects information from your computer and you do not even know. Rootkits malware is usually very difficult to detect and remove from the computer.

Backdoors

Backdoors are similar to malware Trojans or worms, except that they open a "backdoor" on the computer, which provides a network connection for hackers or other malware to send viruses or SPAM to the computer. Hackers can use backdoor malware to install any kind of infected software or take control of the entire computer system.

where does malware come from

Malware can enter your computer system in many different ways. Some common sources of malware entering a computer can be email attachments, infected websites, torrent software, and sharing networks, etc.

Phishing: In order to get personal information from you through Phishing method, emails come from fraud company to your computer. In which viruses can come on filling the information.

Malicious Website: Usually some websites may try to install malware on your computer through pop-ups or malicious links.

Torrents: Files shared through torrents are generally unsafe. Viruses and Trojan malware spread rapidly from torrents because files from torrent applications may not be safe to download.

Shared Networks: If infected malware computers are used on the same shared network then malware can spread in your system.

Pirated Software: If you download free or pirated software from an infected website on the Internet, then malware is secretly hidden in it, so that it enters the computer.

Why use malware

Malware is hidden in all types of malicious software or websites along with viruses and cyber criminals use it for many reasons, such as:

Use to steal or destroy sensitive or personal data information from an infected computer.

A computer user's malware is used to steal information about credit card data or other financial data.

Showing product advertisements in your computer by redirecting them to unwanted advertisements and some unwanted malicious websites.

Changing data information or installing infected software by taking remote control of your computer system.

Interrupting the services or functioning of the system or encrypting or deleting data in memory space such as RAM or hard disk.

How can I protect from malware 

No matter how many types of malware are there, but the good thing is that there are many ways to protect your computer from malware.

Keep your operating system and applications up to date, as cybercriminals look for vulnerabilities in outdated or outdated software, so be sure to install software updates as they become available.

Never accidentally click on a pop-up display link. Rather close the message by clicking on the “X” in the top right corner and thus the display link stays away from the incoming website.

If your devices do not have anti-virus, then use a good paid antivirus, which protects the personal data and information of your computer, tablet, Mac or smartphone from online threats.

Avoid clicking on any unknown url link. Whether it came via email, social networking site or text message, if a url link seems to be uninformed, stay away from it.

Beware of emails that collect personal information. If an email comes from the bank and instructs you to click on that email link or reset password or access your account, do not click it. You directly go to your online banking site and log in from there.

Do not open an unknown email attachment unless you know what the email is, even if it came from an acquaintance or an unfamiliar person.

If you think my device may be infected, scan your device with the anti-virus software you have installed.

Comments