Malware List

the different types of malware and how to protect them
the different types of malware and how to protect them

Un malware is software developed for the purpose of harming a computer system. Word malware alone represents all the malware list.

In this article, we will take a look at the entire list of existing malware and detail them in order to see things a little more clearly. We will also learn how to protect ourselves from it.

Malware List

The Trojan Horse and Backdoor

This software has only one goal: to take remote control of a computer in a hidden way. The Trojans were apparently created in the 80s, by a young hacker German named Karl Koch.

dialers

A dialer is a malicious computer program installed without the user's knowledge and which hacks the modem to trigger calls to premium rate numbers or establishes a connection to a specific website (case of an ADSL modem).

The sole purpose of this malicious software is to remunerate its author through telephone calls that the victim pays without knowing it.

Spyware

Un spyware is a malware which installs itself on a computer with the aim of collecting and transferring information to the infected computer. There are two large families: The adwares and Keyloggers.

  • Adware: adware is software for advertising purposes which is most often installed without the knowledge of the Internet user. This family simply modifies the start page of your internet browser, which then causes the display of contextual advertising links, banners, pop-ups, etc.
    Where this can be very negative is that some of the Adware will target advertising by analyzing certain data from your own computer.
    Its goal ? Bring you to a website, show you advertising (which pays the author of the Adware). Often, these programs can be installed under the term “Search bar”.
  • Keyloggers: A keylogger or keylogger is a program that allows you to record in a file everything that is typed on the keyboard of your computer, then this file is sent by email or by FTP server to the author of the Keylogger.

Computer virus

The term " virus Is almost always used to refer to all types of malware.
Concretely, malicious software such as a “virus” is a program which aims to self-reproduce by infecting other programs.

A virus is very similar to worms except that a virus multiplies on the victim's machine by infecting other processes while a worm spreads over the network. Viruses are losing ground compared to other malware.

To

Software propagated via a computer network. It uses the Internet in all its forms to spread. (emails, websites, etc.).

The wabbit

The Wabbit is a computer program written for the sole purpose of self-replicating indefinitely. Unlike the virus, it does not infect programs or documents. These programs have the ability to multiply very quickly until the memory is full. Which forces you to crash and may cause system corruption.

Downloaders

Downloader is a small executable. Once executed on your computer, it will download another program, usually much more aggressive, such as a trojan or a Rootkit.

The rootkit

The rootkit is a set of software generally allowing you to obtain root rights on a machine, install a backdoor, and erase the traces left by the operation in Log files.

Feat

An exploit is a program allowing a hacker to exploit a computer security vulnerability in an operating system or software, whether remotely (Remote exploit) or on the machine on which this exploit is executed (local exploit).

Arrogant

Rogue is software masquerading as free antivirus, indicating that the PC is severely infected. It proposes to disinfect it in order to make you download these fake antiviruses.

Protect yourself from this malware list

Keep the operating system up to date

Every day new security holes are discovered by hackers on different operating systems. These flaws are exploitable by using malware in order to infect your machine. So the more up-to-date your OS, the less potential there is to get infected.

Keep all PC software up to date

Like operating systems, all software on your PC must also be up to date.
The software most targeted by hackers are browsers (Internet Explorer, Firefox, Opera, Google Chrome), Java, Adobe Flash and Adobe Reader, VLC.

Avoid the most famous traps of the internet

We must remain vigilant and careful with cracks, warez sites, pornographic sites and peer to peer.

Do not open email attachments unless you are absolutely sure of their safety. We have already seen in an article: find a person's IP address easily, the technique used by hackers to recover your IP address when opening an email.

While installing software, do not click “Next” without reading what is marked and what is checked.

Avoid USB keys

Avoid them as much as possible, and at best turn off USB ports, forget about them, and your PC is more likely to stay clean.

Use protection software

As Kevin Mitnick so wisely says: “The best antivirus is people.” However, it is very useful to have software capable of recognizing and removing malware. There are different types depending on the malware you want to protect against.

I share with you the 5 best free antivirus to protect your computer from the various malware we have seen previously.

But be aware that contrary to what the vast majority of people think, security software is not powerful enough to prevent all infections. There is no such thing as 100% security, we simply reduce the chances of our pc infected. So be very careful with what you see on the internet.