Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
10 Different Types of Malware
Watch out for these nasty computer threats:
1. Viruses – This time usually infiltrates your ...
Nächste SlideShare
Wird geladen in …5
×

10 Types of Malware Found Today -- Not Just Viruses

It's not just viruses anymore. 10 different types of malware today can infect your devices and hardware. Make sure you keep it clean and watch what you download. I post content like this at Burnmycomputer.us, and the information in this slideshow is taken from research conducted by PCHealthBoost.com.

  • Loggen Sie sich ein, um Kommentare anzuzeigen.

  • Gehören Sie zu den Ersten, denen das gefällt!

10 Types of Malware Found Today -- Not Just Viruses

  1. 1. 10 Different Types of Malware Watch out for these nasty computer threats: 1. Viruses – This time usually infiltrates your computer when you download harmful programs. Sometimes, it’s hard to tell if you accidentally put malicious software on your computer. Hint: Hackers often rename files to trick people when offering them so-called “freeware.” 2. Trojans – This threat masquerades itself as a legitimate program. This is one reason why you should only go to legitimate websites that sell software. It also happens on torrent sites quite a bit where illegal programs often are posted. 3. Backdoors – Oftentimes this threat works in conjunction with Trojan Horses. It changes programming code as it bypasses computer security. 4. Worms – USB sticks, external storage devices, email services and other objects become infected by this threat. It doesn’t require a host. A slow computer could indicate presence of this infection. 5. Exploits – This malware type takes advantage of system security holes. Any small vulnerability could allow a hacker to attack your PC and steal vita data. 6. Ransomware – When attacked by this infection, your everyday username and/or password credentials may become useless. In the process, someone might try to exploit you by making you pay a “ransom” to have your machine restored. 7. Keyloggers – An information thief can find a way to spy on your computer usage. In the process, the hacker could record your typing patterns. This helps them figure out your usernames and passwords and enables them to commit identity theft. 8. Spyware – Many sites track your date, time and ip address. They also keep record of what links you visit. Most of the time, it’s done to tailor your user history to your like. However, hackers can use this tracking system for evil – to steal passwords, credit card numbers, bank account balances, etc. 9. Adware – This one seems to be the “least of all evils” because all it does is allow websites target ads to you. However, many site visitors find it intrusive. Sometimes ads pop up all over the place even when people don’t want them. 10. Rogues/scareware – Crooked developers might trick you into believing your computer has problems it doesn’t have. For instance, you might receive virus alert messages. If you click on a “scan” button when this fake alert pops up, you might open yourself up to a malicious download. Copyright 2014 All rights reserved. Please ask for permission tov share. by Burn My Computer.US Information taken from the PC HealthBoost Blog. Order PC HealthBoost Here.

×