Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. As of 2011 the majority of active malware threats were worms or trojans rather than viruses.
Computer Virus - A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
Trojan horse - A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.
Spyware - Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
Adware - Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author.
Computer Worm - A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer networkto spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
Ransomware - Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
Scareware - Scareware, included into the class of malware known as Rogueware, comprises several classes of ransomware or scam software with malicious payloads, usually of limited or no benefit, that are sold to consumers via certain unethical marketing practices. The selling approach uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user. Some forms of spyware andadware also use scareware tactics.
Advice, Tips, Tricks and the latest info from inside you local Computer Repair Shop
Wednesday, November 19, 2014
Old Post From April 2014 - Zeus & CryptoLocker - Cybercrime
Zeus & CryptoLocker: What are they?
They are two types of attacks that work together being propagated from some of the largest global cybercrime networks. Normally spread as an innocent and official looking link or email attachment, Gameover Zeus silently monitors data and intercepts communications with online banking sites in order to steal login details and passwords.
Whether or not it succeeds, it will launch the second attack, Cryptolocker, which encrypts the files on a computer and extorts a heavy ransom from the user to regain control of their machine. Once infected, the machine then becomes part of the network spreading the attack. Over $100 million have already been stolen.
Short time to act?
On the 2nd June, the FBI, Europol and the UK’s National Crime Agency announced they had
temporarily disrupted the network of machines spreading the infection, and warned users they have a
two-week window to ensure their computers are secure. That deadline is when they expect the
cybercriminal behind the attack to regain control of the network and potentially
unleash a large scale cyber-attack.
temporarily disrupted the network of machines spreading the infection, and warned users they have a
two-week window to ensure their computers are secure. That deadline is when they expect the
cybercriminal behind the attack to regain control of the network and potentially
unleash a large scale cyber-attack.
What you can do to help stay safe?
Protect your PC: It’s vital that your PC has up-to-date security installed that checks download links and email attachments.
Run Windows Update: Security updates in newer versions of o/s like Windows® will help you to avoid these attacks.
Back up your data: This will prevent Cryptolocker from being a threat to your vital data and documents, and is overall good insurance.
2 step authentication: This added layer of security requires randomly generated codes to confirm online purchases & transfers.
Old Post from April 2014 - End of Windows XP Support
Windows XP Support is coming to a close. On April 8th 2014
What does this mean?
This mean that there will be no more updates or patches provided by Microsoft for this system leaving it open to attacks. If you plan on using this Operating system on the internet then you will be open to identity theft and Hacker attacks. In short this system will no longer be safe to use.
What should I do?
You have 2 options: Upgrade your current computers operating system or purchase a Computer that has a new Operating System on it. I.E. Windows Vista, Windows 7 or Windows 8/8.1 (upgrade cost from XP is on special for $69.99 plus the purchase of a new operating system)
Below is the list of End of Support dates for Windows Operating Systems. The end of extended support is when Microsoft will stop
providing updates for that Operating System.
Operating Systems Last Service Pack End of Main Support End of Ext. Support
Windows XP Service Pack 3 April 14, 2009 April 8, 2014
Windows Vista Service Pack 2 April 10, 2012 April 11, 2017
Windows 7* Service Pack 1 January 13, 2015 January 14, 2020
Windows 8 Windows 8.1 January 9,2018 January 10, 2023
Subscribe to:
Comments (Atom)