|
|
|
Types of Threats |
|||||||||||||
There are a vast number of threats that could affect your computer today: | ||||||||||||||
Worms | ||||||||||||||
This malicious program category largely exploits operating system vulnerabilities to | ||||||||||||||
spread itself. The class was named for the way the worms crawl from computer to | ||||||||||||||
computer, using networks and e-mail. This feature gives many worms a rather high | ||||||||||||||
speed in spreading themselves. | ||||||||||||||
Viruses | ||||||||||||||
Programs that infected other programs, adding their own code to them to gain | ||||||||||||||
control of the infected files when they are opened. This simple definition explains the | ||||||||||||||
fundamental action performed by a virus - infection. | ||||||||||||||
Trojans | ||||||||||||||
Programs that carry out unauthorized actions on computers, such as deleting | ||||||||||||||
information on drives, making the system hang, stealing confidential information, | ||||||||||||||
etc. This class of malicious program is not a virus in the traditional sense of the word | ||||||||||||||
(meaning it does not infect other computers or data). Trojans cannot break into | ||||||||||||||
computers on their own and are spread by hackers, who disguise them as regular | ||||||||||||||
software. The damage that they incur can exceed that done by traditional virus | ||||||||||||||
attacks by several fold. | ||||||||||||||
Spyware | ||||||||||||||
Software that collects information about a particular user or organization without | ||||||||||||||
their knowledge. You might never guess that you have spyware installed on your | ||||||||||||||
computer. | ||||||||||||||
Riskware | ||||||||||||||
Potentially dangerous applications include software that has not malicious features | ||||||||||||||
but could form part of the development environment for malicious programs or could | ||||||||||||||
be used by hackers as auxiliary components for malicious programs. | ||||||||||||||
Rootkits | ||||||||||||||
Utilities used to conceal malicious activity. They mask malicious programs to keep | ||||||||||||||
anti-virus programs from detecting them. Rootkits modify the operating system on | ||||||||||||||
the computer and alter its basic functions to hide its own existence and actions that | ||||||||||||||
the hacker undertakes on the infected computer. | ||||||||||||||
Link to us | Contact us | Site map | Privacy |
© Copyright 2008 USBVirus International Inc. All Rights Reserved |