|
|
|
Types of Threats |
|||||||||
There are a vast number of threats that could affect your computer today: | ||||||||||
Worms | ||||||||||
This malicious program category largely exploits operating system vulnerabilities to | ||||||||||
spread itself. The class was named for the way the worms crawl from computer to | ||||||||||
computer, using networks and e-mail. This feature gives many worms a rather high | ||||||||||
speed in spreading themselves. | ||||||||||
Viruses | ||||||||||
Programs that infected other programs, adding their own code to them to gain | ||||||||||
control of the infected files when they are opened. This simple definition explains the | ||||||||||
fundamental action performed by a virus - infection. | ||||||||||
Trojans | ||||||||||
Programs that carry out unauthorized actions on computers, such as deleting | ||||||||||
information on drives, making the system hang, stealing confidential information, | ||||||||||
etc. This class of malicious program is not a virus in the traditional sense of the word | ||||||||||
(meaning it does not infect other computers or data). Trojans cannot break into | ||||||||||
computers on their own and are spread by hackers, who disguise them as regular | ||||||||||
software. The damage that they incur can exceed that done by traditional virus | ||||||||||
attacks by several fold. | ||||||||||
Spyware | ||||||||||
Software that collects information about a particular user or organization without | ||||||||||
their knowledge. You might never guess that you have spyware installed on your | ||||||||||
computer. | ||||||||||
Riskware | ||||||||||
Potentially dangerous applications include software that has not malicious features | ||||||||||
but could form part of the development environment for malicious programs or could | ||||||||||
be used by hackers as auxiliary components for malicious programs. | ||||||||||
Rootkits | ||||||||||
Utilities used to conceal malicious activity. They mask malicious programs to keep | ||||||||||
anti-virus programs from detecting them. Rootkits modify the operating system on | ||||||||||
the computer and alter its basic functions to hide its own existence and actions that | ||||||||||
the hacker undertakes on the infected computer. | ||||||||||
Link to us | Contact us | Site map | Privacy |
© Copyright 2008 USB AntiVirus International Inc. All Rights Reserved |