0% found this document useful (0 votes)
12 views11 pages

Malware

Malware is intrusive software designed to damage computers and systems. Common types of malware include viruses, worms, Trojans, spyware, adware, and ransomware. Trojans disguise themselves as legitimate software to trick users into running malicious code. Spyware and adware collect personal information to steal data or display ads. Rootkits and ransomware restrict access to systems until payments are made. Worms replicate across networks to interrupt connectivity. Keyloggers record keystrokes to access accounts without authorization.

Uploaded by

mayankmarvel6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views11 pages

Malware

Malware is intrusive software designed to damage computers and systems. Common types of malware include viruses, worms, Trojans, spyware, adware, and ransomware. Trojans disguise themselves as legitimate software to trick users into running malicious code. Spyware and adware collect personal information to steal data or display ads. Rootkits and ransomware restrict access to systems until payments are made. Worms replicate across networks to interrupt connectivity. Keyloggers record keystrokes to access accounts without authorization.

Uploaded by

mayankmarvel6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Malware

What is Malware?

Malware is intrusive software that is designed to


damage and destroy computers and computer
systems. Malware is a contraction for malicious
software. Examples of common malware includes
viruses, worms, Trojan viruses, spyware, adware,
and ransomware.
Common Malwares
 Trojans
 Spyware
 Adware
 Rootkits
 Ransomeware
 Worms
 Keyloggers
Trojans
A Trojan (or Trojan Horse) disguises
itself as legitimate software with the
purpose of tricking you into executing
malicious software on your computer.
Spyware
Spyware invades your computer and
attempts to steal your personal
information such as credit card or
banking information, web browsing
data, and passwords to various
accounts.
Adware
Adware is unwanted software that
displays advertisements on your
screen. Adware collects personal
information from you to serve you
with more personalized ads.
Rootkits
Rootkits enable unauthorized
users to gain access to your
computer without being
detected.
Ransomware
Ransomware is designed
to encrypt your files and
block access to them until
a ransom is paid.
Worms
A worm replicates itself by
infecting other computers that
are on the same network.
They’re designed to consume
bandwidth and interrupt
networks.
Keyloggers
Keyloggers keep track of your
keystrokes on your keyboard and
record them on a log. This
information is used to gain
unauthorized access to your
accounts.
Made by - Mayank

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy