Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

More Than A Virus, Common Malware to Watch Out For

11/1/2018

 
Picture
The term "virus" is often used to describe many different types of infection a computer might have.  Virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common is that they are typically designed to cause damage, steal data, or spread across a network.

Malware on the other hand describes software designed to act maliciously on a personal computer.  The name 'malware' is a shorthand for 'malicious software' and describes exactly what it is. A computer virus is a single type of malware that can cause harm to your PC, but it is only one of many. Lets take a look at the most common forms of malware and what effect they have on your computer.

Adware
Short for advertising-supported software, adware is a type of malware that delivers advertisements to your computer.  These advertisements are often intrusive, irritating, and typically designed to trick you into clicking something you don't want. A common example of adware would be pop-up ads that appear on many websites and mobile applications.

Another place adware is encountered is when it is attached to “free” software. Developers or distributors of free software often sell advertising space on these free programs to advertisers as a way of generating revenue. In some instances, the user is notified of these additions during the install process and allowed to skip the installation of the adware, but many times the adware is hidden from the user during this process. Remember to always be careful when installing software of any kind and read what is on the screen before clicking next, I agree, etc.

Spyware
Spyware is designed to spy on the user's activity without their knowledge or consent.  Often installed in the background, spyware can collect keyboard input, harvest data from the computer, monitor web activity and more. Spyware can also take the form of malicious browser extensions. While there are many legitimate and useful browser extensions, be sure to read what data they request access to and read the privacy and terms of use before installing.

Spyware typically requires installation to the computer. This is commonly done by tricking users into installing spyware themselves instead of the software or application that they thought they were getting. Victims of spyware are often be completely unaware of its presence until the data stolen is acted on in the form of fraudulent bank transactions or stolen online accounts.

Virus
In technical terms a computer virus is a form of malware that is installed inadvertently, causing damage to the user.  A typical virus may install a keylogger to capture passwords, logins, and bank information from the keyboard.  It might steal data, interrupt programs, and cause the computer to crash.

Modern virus programs commonly use your computers processing power and internet bandwidth to perform tasks remotely for hackers.  The first sign of this can be when the computer sounds like it is doing a lot of work when no programs should be running. A computer virus is often spread through installing unknown software or downloading attachments that contain more than they seem.

Ransomware
A particularly malicious variety of malware, known as ransomware, prevents the user from accessing their own files until a ransom is paid.  Files within the system are often encrypted with a password that won't be revealed to the user until the full ransom is paid.
Instead of accessing the computer as normal, the user is presented with a screen which details the contact and payment information required to access their data again.
Ransomware is typically downloaded through malicious email file attachments, or a vulnerability in the computer system.

Worm
Among the most common types of malware today is the computer worm.  Worms spread across computer networks by exploiting vulnerabilities within the operating system.  Often these programs cause harm to their host networks by consuming large amounts of network bandwidth, overloading computers, and using up all the available resources.
One of the key differences between worms and a regular virus is its ability to make copies of itself and spread independently.  A virus must rely on human activity to run a program or open a malicious attachment; worms can simply spread over the network without human intervention.  
 
If you would like us to make sure your systems stay safe from malware, give us a call at 715-255-0325.

Comments are closed.

    Yellowstone Computing

    To read about us, click here!

    Archives

    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.