Can replicate, but needs you to run a program in some way. Spreads though the file system or network. May be invisible and not cause damage.
. Malware that is inside the booting process - does not need the OS
. Malware that encrypts your data
. Bad guys want your money, so they take your most valued asset - your data
. Malware that self replicates - you do nothing and it runs on its own
. Application that pretends to be something other than what it is to trick you into running it; doesn't care about replicating; circumvents security
. The ultimate backdoor that gives admin control of the device
. Invisible to the OS - avoids detection by Anti-malware software
. Records keystrokes into a file and sends file off to the badguys; a way to circumvent encryption; can even record screenshots or clipboard
. Pop ups that can occur whether you are online or not; could have been loaded with other legit software
. Watches you, often for ad purposes; watches your browser and can even have it's own keylogger
. Your computer is a robot and you don't know it - its running as part of a network awaiting commands - used in DDoS attacks, sometimes rented
. Extrinsic danger to the system
. Utilized by an attacker to create a real threat
. Once a malware runs, it can open a door in the OS that allows other malware in; allows avoidance of normal authentication; some are intentionally programmed in
. Opening a compromised web page could allow dangerous code to install on your device
. The term for anti-virus updates
. Waits for a predefined event, time, or action and is often planted by a disgruntled employee
.
|