Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
1. Worms
2. Computer Viruses
3. Bots and Botnets
4. Trojan Horses
5. Rootkit
6. Ransomware
7. Adware and Scams
8. Spyware
9. Spam and Phishing
Worms are spread via software vulnerabilities or phishing attacks. Once a worm has installed itself into your computer’s memory, it starts to infect the whole machine and in some cases… your whole network.
Spyware secretly records your online activity, harvesting your data and collecting personal information such as usernames, passwords and surfing habits.
A bot is a computer that’s been infected with malware so it can be controlled remotely by a hacker.
That bot (aka a zombie computer), can then be used to launch more attacks or to become part of a collection of bots (aka a botnet).
Unlike worms, viruses need an already-infected active operating system or program to work. Viruses are typically attached to an executable file or a word document.
Phishing is a type of social engineering attack, rather than a type of malware. But is a common method of cyber attack. Phishing is successful since the emails sent, text messages and web links created look like they’re from trusted sources. They’re sent by criminals to fraudulently acquire personal and financial information.
Adware is one of the better-known types of malware. It serves pop-ups and display ads that often have no relevance to you.
Ransomware denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.
Just as it sounds, a Trojan Horse is a malicious program that disguises itself as a legitimate file. Because it looks trustworthy, users download it and… hey presto, in storms the enemy.