|
|
|
|
|
|
|
|
|
|
|
|
Types of Threats |
||||||||||||
| There are a vast number of threats that could affect your computer today: | ||||||||||||||
| Worms | ||||||||||||||
| This malicious program category largely exploits operating system vulnerabilities to | ||||||||||||||
| spread itself. The class was named for the way the worms crawl from computer to | ||||||||||||||
| computer, using networks and e-mail. This feature gives many worms a rather high | ||||||||||||||
| speed in spreading themselves. | ||||||||||||||
| Viruses | ||||||||||||||
| Programs that infected other programs, adding their own code to them to gain | ||||||||||||||
| control of the infected files when they are opened. This simple definition explains the | ||||||||||||||
| fundamental action performed by a virus - infection. | ||||||||||||||
| Trojans | ||||||||||||||
| Programs that carry out unauthorized actions on computers, such as deleting | ||||||||||||||
| information on drives, making the system hang, stealing confidential information, | ||||||||||||||
| etc. This class of malicious program is not a virus in the traditional sense of the word | ||||||||||||||
| (meaning it does not infect other computers or data). Trojans cannot break into | ||||||||||||||
| computers on their own and are spread by hackers, who disguise them as regular | ||||||||||||||
| software. The damage that they incur can exceed that done by traditional virus | ||||||||||||||
| attacks by several fold. | ||||||||||||||
| Spyware | ||||||||||||||
| Software that collects information about a particular user or organization without | ||||||||||||||
| their knowledge. You might never guess that you have spyware installed on your | ||||||||||||||
| computer. | ||||||||||||||
| Riskware | ||||||||||||||
| Potentially dangerous applications include software that has not malicious features | ||||||||||||||
| but could form part of the development environment for malicious programs or could | ||||||||||||||
| be used by hackers as auxiliary components for malicious programs. | ||||||||||||||
| Rootkits | ||||||||||||||
| Utilities used to conceal malicious activity. They mask malicious programs to keep | ||||||||||||||
| anti-virus programs from detecting them. Rootkits modify the operating system on | ||||||||||||||
| the computer and alter its basic functions to hide its own existence and actions that | ||||||||||||||
| the hacker undertakes on the infected computer. | ||||||||||||||
|
|
|
|
Link to us | Contact us | Site map | Privacy |
|
© Copyright 2008 USBVirus International Inc. All Rights Reserved |