It's not just viruses anymore. 10 different types of malware today can infect your devices and hardware. Make sure you keep it clean and watch what you download. I post content like this at Burnmycomputer.us, and the information in this slideshow is taken from research conducted by PCHealthBoost.com.
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
10 Types of Malware Found Today -- Not Just Viruses
1. 10 Different Types of Malware
Watch out for these nasty computer threats:
1. Viruses – This time usually infiltrates your computer when you download
harmful programs. Sometimes, it’s hard to tell if you accidentally put malicious
software on your computer. Hint: Hackers often rename files to trick people
when offering them so-called “freeware.”
2. Trojans – This threat masquerades itself as a legitimate program. This is one
reason why you should only go to legitimate websites that sell software. It also
happens on torrent sites quite a bit where illegal programs often are posted.
3. Backdoors – Oftentimes this threat works in conjunction with Trojan Horses. It
changes programming code as it bypasses computer security.
4. Worms – USB sticks, external storage devices, email services and other
objects become infected by this threat. It doesn’t require a host. A slow
computer could indicate presence of this infection.
5. Exploits – This malware type takes advantage of system security holes. Any
small vulnerability could allow a hacker to attack your PC and steal vita data.
6. Ransomware – When attacked by this infection, your everyday username
and/or password credentials may become useless. In the process, someone
might try to exploit you by making you pay a “ransom” to have your machine
restored.
7. Keyloggers – An information thief can find a way to spy on your computer
usage. In the process, the hacker could record your typing patterns. This helps
them figure out your usernames and passwords and enables them to commit
identity theft.
8. Spyware – Many sites track your date, time and ip address. They also keep
record of what links you visit. Most of the time, it’s done to tailor your user
history to your like. However, hackers can use this tracking system for evil – to
steal passwords, credit card numbers, bank account balances, etc.
9. Adware – This one seems to be the “least of all evils” because all it does is
allow websites target ads to you. However, many site visitors find it intrusive.
Sometimes ads pop up all over the place even when people don’t want them.
10. Rogues/scareware – Crooked developers might trick you into believing your
computer has problems it doesn’t have. For instance, you might receive virus
alert messages. If you click on a “scan” button when this fake alert pops up, you
might open yourself up to a malicious download.
Copyright 2014 All rights reserved. Please ask for permission tov share.
by Burn My Computer.US Information taken from the PC HealthBoost Blog. Order PC HealthBoost Here.