Un malware is software developed for the purpose of harming a computer system. Word malware alone represents all the malware list.
In this article, we will go through the entire list of existing malware and detail them in order to see a little more clearly. We will also learn how to protect yourself from it.
The Trojan Horse and Backdoor
These software have only one goal: the remote control of a computer in a hidden way. The Trojans were said to have been created in the 80s, by a young hacker German named Karl Koch.
A dialer is a malicious computer program installed without the knowledge of the user and which hacks the modem to trigger calls to premium rate numbers or establishes a connection to a specific website (case of an adsl modem).
The sole purpose of this malicious software is to remunerate its author through telephone calls that the victim pays without knowing it.
Un spyware is a malware which installs itself in a computer for the purpose of collecting and transferring information about the infected computer. There are two main families: adwares and Keyloggers.
- Adware: adware is software for advertising purposes which is most often installed without the knowledge of the Internet user. This family simply modifies the start page of your internet browser, which then causes the display of contextual advertising links, banners, pop-ups, etc.
Where this can be very negative is that some of the adware will target advertising by scanning certain data from your own computer.
Its goal ? Make you come to a website, show you advertising (which pays the author of the Adware). Often, these programs can be installed under the term "Search bar"
- Keyloggers: A keylogger or keylogger is a program that allows you to record in a file everything that is typed on the keyboard of your computer, then this file is sent by email or by FTP server to the author of the Keylogger.
The term " virus Is almost always used to refer to all types of malware.
In concrete terms, “virus” type malware is a program that aims to reproduce itself by infecting other programs.
A virus is very similar to worms except that a virus multiplies on the victim's machine by infecting other processes while a worm spreads over the network. Viruses are losing ground compared to other malware.
Software propagated through a computer network. It uses the Internet in all its forms to spread. (emails, websites, etc ...).
Wabbit is a computer program written for the sole purpose of self-replicating indefinitely. Unlike viruses, it does not infect programs or documents. These programs have a capacity to multiply very quickly until the memory is full. Which forces you to do a sudden shutdown and can cause system corruption.
Downloader is a small executable. Once executed on your computer, it will download another program, usually much more aggressive, such as a trojan or a Rootkit.
The rootkit is a set of software generally allowing to obtain root rights on a machine, to install a backdoor, and to erase the traces left by the operation in the Log files.
An exploit is a program allowing a hacker to exploit a computer security vulnerability in an operating system or software, whether remotely (Remote exploit) or on the machine on which this exploit is executed (local exploit).
Rogue is software masquerading as free antivirus, indicating that the PC is severely infected. It proposes to disinfect it in order to make you download these fake antiviruses.
Protect yourself from this malware list
Keep the operating system up to date
Every day new security holes are discovered by hackers on different operating systems. These flaws are exploitable by using malware in order to infect your machine. So the more up-to-date your OS, the less potential there is to get infected.
Keep all PC software up to date
Like operating systems, all software on your PC must also be up to date.
The software most targeted by hackers are browsers (Internet Explorer, Firefox, Opera, Google Chrome), Java, Adobe Flash and Adobe Reader, VLC.
Avoid the most famous traps of the internet
We must remain vigilant and careful with cracks, warez sites, pornographic sites and peer to peer.
Do not open email attachments unless you are absolutely sure that they are harmless. We have already seen in an article: find a person's IP address easily, the technique used by hackers to retrieve your IP address when opening an email.
While installing software, do not click "Next" without reading what is marked and what is checked.
Avoid USB keys
Avoid them as much as possible, and at best turn off USB ports, forget about them, and your PC is more likely to stay clean.
Use protection software
As Kevin Mitnick says so wisely: "The best antivirus is humans." However, it is very useful to have software that can recognize and remove malware. There are different types depending on the malware you want to protect yourself from.
I share with you the 5 best free antivirus to protect your computer from the various malware we have seen previously.
But be aware that contrary to what the vast majority of people think, security software is not powerful enough to prevent all infections. There is no such thing as 100% security, we simply reduce the chances of our pc infected. So be very careful with what you see on the internet.