Malware

Malware refers to any program installed on a computer that performs harmful actions. Malware may steal personal information, encrypt files for ransom, or perform any number of other criminal acts. Common types of malware include viruses, Trojans, worms, rootkits, and ransomware. Both commercial and free software is available to remove malware from an infected machine. However, the best protection from malware is safe browsing habits.

87323252-107140.jpg87323252-107139.jpg

Types of Malware

Computer users will encounter a large number of distinct types of malware over the lifetime of a computer. The most common of these is the virus. While virus is often used as a catch-all term for many types of malware, it specifically refers to any type of self-replicating program designed to interfere with a user’s activities on a computer. A virus may take up valuable space on a hard drive, change computer settings, retain copies of keystrokes and credit card information, or damage an operating system beyond repair. Viruses are most commonly spread through email and instant message attachments. Some viruses even access a user’s contact information and then use that account to send email to all the user’s contacts. If a contact opens the email, the virus is spread to a new computer.

Trojans, named for the mythical Trojan horse, are a type of malware that masquerades as another program. Some Trojans trick users into downloading them by posing as antivirus or other necessary software. The program then pretends to carry out its advertised functions while secretly acting in the same manner as a virus. Trojan horses commonly hijack the computer to install more malicious software, such as viruses and adware.

Computer worms are self-replicating computer programs that distribute malicious code across networks. While worms are often confused with viruses, they spread in different ways. Viruses may require the guidance of a cyber-criminal and may be remotely activated by that person. Worms operate entirely autonomously, quickly spreading to all machines on a network through backdoor and other software vulnerabilities. Once installed on a machine, a computer worm may use up bandwidth, delete files, or make copies of personal information. Worms may also automatically email a computer user’s contacts with a link to a website containing the worm with the intent of spreading it to new networks.

A rootkit is a type of malware designed to remain undetected by traditional antivirus tools. Systems infected with rootkits may not display any obvious signs of being infected. Rootkits sometimes appear as legitimate system processes to antivirus software, so that the software will overlook them. Additionally, most rootkits boot before the computer’s operating system, allowing the rootkit access large amounts of sensitive information. Rootkits are notoriously difficult to remove and may require professional assistance.

Ransomware is software that intentionally holds a user’s personal information hostage by heavily encrypting all personal or important files on an infected machine. Unless a uniquely generated encryption key is entered, these files will remain completely inaccessible. The ransomware offers the encryption key in exchange for a large monetary payment. In many cases, personal files stolen by ransomware are lost unless the demands for payment are met. While law-enforcement agencies urge computer users not to accommodate the demands of criminals, it is unlikely that heavy encryption can be broken without its specific key. If the computer user has backups of all important files, a malware removal specialist may simply remove the ransomware and restore the files to their proper places.

Malware Removal and Avoidance

Many types of malware can be identified and removed by the average computer user with the proper use of specialized antivirus software. This software scans a computer for any known viruses, as well as any suspiciously behaving files and gives the user an option to remove them.

Antivirus software comes in many unique varieties. Some software requires periodic payment, such as Norton and MacAfee. Other software, such as Malwarebytes and Avast, operates mostly for free. Antivirus software must be kept up to date and run on a regular basis to be effective. Some antiviruses will automatically perform scans at predetermined time intervals, so the user does not have to remember to scan. Users should also perform a scan any time their computer begins to act in a suspicious manner.

While antivirus software may be effective at removing some malware already in place, the best defense against malware is safe Internet browsing habits. Computer users should thoroughly vet any new website they plan on visiting and make sure their firewall is turned on. Users should only download files from trusted sources and should scan them before opening them. Additionally, they should never open email from an unknown source or any unexpected attachments from a known source. Lastly, users should heed any warnings about dangerous websites from their search engine, browser, or antivirus software. Even if a website was once a trusted address, it may have recently been compromised.

Bibliography

Cisco. "What is the Difference: Viruses, Worms, Trojans, and Bots?" Cisco. Cisco. Web. 28 Jan. 2016. http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html

Swain, Bijay. "What Are Malware, Viruses, Spyware, and Cookies, and What Differentiates Them?" Symantec. Symantec Corporation. Web. 28 Jan. 2016. http://www.symantec.com/connect/articles/what-are-malware-viruses-spyware-and-cookies-and-what-differentiates-them

"What Is a Computer Virus or a Computer Worm?." Kaspersky Lab. Web. 28 Jan. 2016. http://www.kaspersky.com/internet-security-center/threats/viruses-worms

"What Is a Trojan Virus?" Kaspersky Lab. Web. 28 Jan. 2016.

http://www.kaspersky.com/internet-security-center/threats/trojans

"What is malware and how can we prevent it?" PC Tools. Symantec. Web. 28 Jan. 2016.

http://www.pctools.com/security-news/what-is-malware/