0% found this document useful (0 votes)
31 views17 pages

Malware

Uploaded by

Roxanne Garbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views17 pages

Malware

Uploaded by

Roxanne Garbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Malware

Dangerous Software that Puts Computers


and
Mobile Devices at Risk.
Questions?
Can you tell if your device is infected by a
1 malware?

What are the signs that your device is


2 infected by a malware?

What would you do if your device


3 became infected?
What is Malware?
Software intended to damage or abuse
1 computer systems, steal information,
cause disruptions, or obtain illegal
access.

It can give cybercriminals access to files


2 and data on your computer and the
ability to control your system remotely.

These malicious programs steal, encrypt


and delete sensitive data; alter or hijack
3 core computing functions and monitor
end users' computer activity.
Types of Malware

Viruses

• A type of malware that, when executed, replicates itself


by modifying other computer programs and inserting its
own code into those programs.
Types of Malware

Worm

• A type of malware that can automatically propagate or


self-replicate without human interaction, enabling its
spread to other computers across a network.
Types of Malware

Trojans

• A
A type type of
of malware malwareonto
that downloads that downloads
a computer disguisedonto a computer
as a legitimate program.
disguised as a legitimate program.
Types of Malware

Ransomware

• A type of cryptovirological malware that permanently blocks


access to the victim's personal data unless a ransom is paid.
Types of Malware

Spyware
• Any software with malicious behavior that aims to gather
information about a person or organization and send it to
another entity in a way that harms the user by violating
their privacy, endangering their device's security, or other
means.
Malware Distribution

Email Attachments Malvertising

Phishing Attacks Infected Website


Mobile Malware

• Mobile malware refers to malicious software


specifically designed to target mobile devices,
such as smartphones and tablets, compromising
their security, privacy, and functionality through
various attack vectors and techniques.
Mobile Malware Infection Chain
Annual Malware Attacks
Annual Malware Attacks
• In 2023, the worldwide number of malware attacks reached 6.06 billion, an increase
of 10 percent compared to the preceding year.
• In recent years, the highest number of malware attacks was detected in 2018, when
10.5 billion such attacks were reported across the globe.
• In 2022, worm malware was blocked over 205 million times.
• Another common malware type during that period, Emotet, primarily targeted the
Asia-Pacific region.
• Overall, websites are the most common vector for malware attacks and recent
industry data found that malware attacks were frequently received via exe files.
Malware Prevention and Detection

• Malware detection and prevention involves the use


of various security measures, such as antivirus
software, firewalls, and regular system updates, to
identify and stop malicious software from infecting
computer systems.
Malware Prevention
Conclusion

• In conclusion, malware poses a significant


threat to individuals, organizations, and
society as a whole.
• It is crucial to stay vigilant, employ robust
security measures, and continually adapt to
the evolving landscape of malware attacks.
Thank You!!!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy