A lot of people use many different security programs in their computers to avoid the attacks of viruses, Trojans, worms, spyware, adware, and ransomware. They downloaded various applications to prevent others from stealing or destroying personal data like warning emails from employers, online banking information, login credentials to adult websites and online stores, and more importantly selfies with life-sized dolls. A person who is extremely careful about such threats probably uses multiple layers of security protections on a computer. As a result, the entire computer resources are barely enough to even run a light word-processing program; the operating system crashes all the time and the computer is never turned on again – that is safe. In reality, what the person really need is just one good anti-malware. The main reason is that all those bad things that can stealthily attack the computer are just malware but with different names.
When you intentionally overheard people talking about computer virus, they were referring to one specific type of malware. The term “virus” is more popularly used by the public for several reasons: partly because it sounds more dangerous, partly because it is easier to spell, but mostly because they don’t know what malware is.
Malware is the short name for Malicious Software and it has the power to do plenty of nasty things to your computer. Since you have very close connection with your computer – probably too close, in fact – malware attacks can also bring bad effects to your health, financial, relationship, or simply life. While the maliciousness is more often targeted at computers, malware is also increasingly popular among mobile devices as well.
When you understand others, it is easier to deal with them or just avoid bumping into them on the sidewalks; same principle is applicable to malware. As the name suggest, malware is a type of software written with the sole intentions to do malicious things to its host. It does its purpose through various methods for examples altering computer functions, gathering data, deleting useful information, spying user’s computer activity, and providing remote access – all without the user’s permission. It is an abuse done by software to host computer.
Your computer can get infected from different sources both online and offline. Certain websites, files, or emails can possibly and unknowingly contain malware. When you access or download them, the malware is transferred to the computer and so it begins the actions.
Malware usually spreads to Internet users via drive-by download. This is the kind of download that happens automatically without actions on your part. As soon as you visit or access malware-infected websites or emails, the download is triggered in an instant – this is why malware is often planted to most-frequently visited websites or services such as insurance, food & beverage, and entertainment. Of course, the “entertainment” part also includes low-budget movies about intimate relationship – the budget is so low to the point where the characters wear no clothes and most movies are quite short to minimize the use of hard drive; they don’t even bother writing more than two pages of script. For many people, such peculiar form of entertainment is an offer they cannot refuse.
|Do not leave an infected laptop unattended. Doctor's order.|
Offline infection can happen when you connect infected-hardware to your computer such as flash drive, external hard drive, CD, or DVD, especially when the Autoplay option is turned-on. Physical keyboard and mouse do not contain malware because it has no files that provide the malware a place to hide.
Types of Malware
As discussed earlier, there are some different popular types of malware as follows:
- Virus: malware that contains harmful code with the ability to destroy or alter critical computer system files. It can also self-replicate inside the host to spread and worsen the damage. A virus can render the computer useless or at least consume large portion of computer resources.
- Spyware: just like in many TV shows, except Game of Thrones of course, spyware tracks your computer activities. It gathers data from your computer including system files and sends the data to whoever controls the spyware.
- Trojan: typically disguised as a perfectly-safe executable program, Trojan can be programmed to take over computer resources and steal personal information. One of the most dangerous and malicious examples of Trojan software is the one disguised as webcam application. When activated, the Trojan can activate webcam without turning on any indicator such as blinking light; the person who sends the Trojan to your computer can spy on you through the webcam. Don’t use your massager anywhere around a webcam.
- Worms: malware that acts like a worm. It eats (destroys) computer files and data stored on hard drive. Computer worms do not excrete feces, so your computer is still clean.
- Adware: the most benign form of malware. An adware, when not used as a disguise for the delivery service of other types of malware, is not dangerous. Its only purpose is to track your Internet activity and figure out which websites you visit the most. An adware will follow you anywhere and display advertisements, mostly in an annoying way.
- Ransomware: the malware that restricts your access to your own computer. It kidnaps your access to computer and asks for money in exchange. The only computers in the world invulnerable to ransomware are Liam Neeson’s and his daughter’s.
Until late 1990s when the World Wide Web was becoming a more serious thing, most malware were merely pranks; they were the practical jokes that computer programmers did in their spare time. The vast majority of people who wrote malware back then were teenagers (the smart ones for sure); they did that just because they could and for the fun of it.
Over time and as the Internet grows, more people realize that malware can be really annoying and destructive so many of them use their talents in writing malicious programs for professional purposes of stealing and making money. Not every hacker is bad; a lot of hackers actually help others (such as tech companies and governments) to find vulnerabilities to their computer/network systems and give solutions.
Considering the fact that you cannot live, work, and find dates without computer and Internet, using a reliable professional anti-malware program on your computer and mobile devices in addition to the built-in firewall is always good investment. Most people say that free anti-malware programs are often not good enough, because maybe it is true. Even if you use free anti-malware, make sure it is made by reputable companies.