Short for “malicious software”. It is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
A malware sandbox, within the computer security context, is a system that confines the actions of an application, such as opening a Word document, to an isolated environment. Within this safe environment the sandbox analyzes the dynamic behavior of an object and its various application interactions in a pseudo-user environment and uncovers any malicious intent.
Screen lockers shut off access to your computer by taking over the operating system. They deny access to the data but don’t encrypt it.
Is malicious software that tricks computer users into visiting malware-infested websites. Also known as deception software, rogue scanner software or fraudware, scareware may come in the form of pop-ups.
Is an AI-powered malware. DeepLocker was developed as a proof of concept by IBM Research in order to understand how several AI and malware techniques already being seen in the wild could be combined to create a highly evasive new breed of malware, which conceals its malicious intent until it reached a specific victim.
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry.
Backdoor it’s a program or bit of code designed to allow a computer to be remotely accessed (typically for diagnostic, configuration, or technical support purposes).
A logic bomb is a type of malicious software that is appended to an application and is triggered by a specific occurrence, such as a logical condition or a specific date and time.
A Trojan or a Trojan horse is a program that hides in a useful program and usually has a malicious function. A major difference between viruses and Trojans is that Trojans do not self-replicate. In Addition to launching attacks on a system, a Trojan can establish a back door that can be exploited by attackers.
A dropper is a kind of Trojan that has been designed to “install” some sort of malware (virus, backdoor, etc.) to a target system. The malware code can be contained within the dropper (single stage) in such a way as to avoid detection by virus scanners or the dropper may download the malware to the target machine once activated (two stage).
Adware is an unwanted software application designed to throw advertisements up on your screen, most often within a web browser. Advertising banners are displayed while any program is running. It can be automatically downloaded to your system while browsing any website and can be viewed through pop-up windows or through a bar that appears on the computer screen automatically.
Spyware is a type of program that is installed to collect information about users, their computers or their browsing habits. It tracks everything you do without your knowledge and sends the data to a remote user.
Worms differ from viruses in that they do not attach to a host file but are self-contained programs that propagate across networks and computers. Worms are commonly spread through email attachments; opening the attachment activates the worm program.
A stealth virus uses various mechanisms to avoid detection by antivirus software. Generally, stealth describes any approach to doing something while avoiding notice. These viruses conceal any increase in the size of an infected file or changes to the file’s date and time of last modification.
Keyloggers, also referred to as system monitors, are applications designed to capture computer activity, including keystrokes, websites visited, search history, email discussions, chatroom dialogue, and system credentials. They typically collect screenshots of the current window at scheduled intervals.