0% found this document useful (0 votes)
20 views9 pages

Evolution of Malware Group 3 NEWTON

Malware refers to malicious software designed to disrupt or gain unauthorized access to computer systems. It has evolved over time from early experiments in the 1970s to today's sophisticated threats. There are four main types: computer viruses, worms, Trojan horses, and ransomware. Malware spreads through various methods like email attachments, malicious websites, infected USB drives, and more. To avoid malware attacks, users should keep systems updated, use caution when clicking links or downloading files, and employ antivirus software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views9 pages

Evolution of Malware Group 3 NEWTON

Malware refers to malicious software designed to disrupt or gain unauthorized access to computer systems. It has evolved over time from early experiments in the 1970s to today's sophisticated threats. There are four main types: computer viruses, worms, Trojan horses, and ransomware. Malware spreads through various methods like email attachments, malicious websites, infected USB drives, and more. To avoid malware attacks, users should keep systems updated, use caution when clicking links or downloading files, and employ antivirus software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

GROUP 3

Evolution of
Malware
what is it and how does it work?
What is
Malware?
Malware, short for “Malicious Software”, refers to any
software specifically designed to disrupt, damage, or
gain unauthorized access to computer systems,
networks, or data developed by cybercriminals aka
“hackers”.

Its primary purpose is to exploit vulnerabilities in


computer systems for various malicious intents, such as
stealing sensitive information, causing system
malfunctions, or controlling the compromised system
remotely.
People first started writing malware in the
1970s and early 1980 They were written as
experiments or pranks for fun.

The 'Creeper virus’ was created in 1971.

Malware Created as an experiment, Creeper did not


cause damage but did foretell the future of

history
malware with its quick spread through
systems. 'Reaper' was created to hunt and
destroy Creeper- one of the first examples of
an “anti-virus” program.

When and how did it Term “malware” coined in 1990.


start?
Use of malware increased in the early 2000s.

Experts believe that 32% of the world's


computers have some type of malware
installed today.
The number of malware attacks increased year by
year for the first time in 2022, since peaking in 2018. TYPES:
The total number of reported malware attacks was
10.5 billion in 2018. Since then it had been decreasing
to reach 5.4 billion in 2021. The number of 5.5 billion in
2022 marking a slight increase
Computer viruses
Since malware has been evolving to it is spreading
rapidly thru email attachments, malicious
advertisement on popular sites and fake software
etc. Worms

4 Main types of
Trojan horses

Malware
Ransomware

Spyware
Computer Worms are standalone
malware programs that
Trojans
virus
replicate themselves and
spread across computer
networks, often without Trojans disguise themselves
requiring user interaction. as legitimate software or files
They exploit security to trick users into
Viruses attach themselves to vulnerabilities to downloading and executing
executable files and replicate propagate and can cause them. Once activated, Trojans
when the infected file is significant damage by can perform various
executed. They can spread malicious actions, such as
consuming network
throughout a computer system stealing sensitive information,
bandwidth or exploiting
and may also infect other installing other malware, or
system resources.
computers via infected files or granting unauthorized access
network connections. to the system.

Worms
Ransomware Spyware
Ransomware encrypts files or Spyware secretly monitors user
locks users out of their systems activity, collects sensitive
and demands payment (usually information (such as
in cryptocurrency) for decryption keystrokes, passwords, and
or restoration of access. browsing habits), and sends it
Ransomware attacks can cause to a remote server without the
data loss, financial loss, and user's consent. It is often used
operational disruptions for for surveillance, identity theft, or
individuals and organizations. targeted advertising purposes.
How does malware
spread?
Since its birth more than 30 years ago,
malware has found several methods of attack.
They include email attachments, malicious
advertisements on popular sites (malvertising),
fake software installations, infected USB
drives, infected apps, phishing emails and
even text messages.
How can we avoid malware
attacks?
here are ways to protect yourselves from malware:

Use a non-administrator account


Think twice before clicking
whenever possible.
links or downloading
Keep your computer and software anything.
updated.
Limit your file-sharing and
Don't trust pop-up windows that ask use antivirus software.
you to download software.

Be careful about opening email


attachments or images.
There are alot of damages a malware could
do and it’s very crucial to be aware of it.
Overall, avoiding malware helps protect your
digital assets, privacy, and financial well-
being while also contributing to a safer and
more secure online environment for yourself
and others.

E-TECH
GROUP 3 PRESENTATION

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy