Computer worm virus
Time Bomb: Malware that executes at a specific time and/or date. Spyware: Malware that gathers information about you, usually to track your internet use and deliver pop-up ads. Examples include email spoofing (using email header that appears to be from someone you trust), IP spoofing (using a fake IP address to impersonate a trusted machine) and address bar spoofing (using malware to force you to view a specific web page). Spoofing: When cybercriminals try to get into your computer by masquerading as a trusted source. Sniffing attack: Capturing unencrypted network data using sniffer malware. Sextortion: Blackmail schemes that threaten to distribute your sensitive or embarrassing private material unless you pay a ransom or provide them with sexual images or favors. The goal is usually to steal the identity information from your computer, often to gain control of a system.
#Computer worm virus software#
Rootkit: Disguises itself as normal files that “hide in plain sight” so your antivirus software overlooks them. Rogue Security Software: Malware that pretends to be malware removal software. Ransomware: Malware that encrypts data or locks computers until a ransom is paid. Pwned: Having appropriated or gained control of your email address or other cyber personal information. Polymorphic Virus: Virus that changes its digital footprint every time it replicates to elude antivirus software. Piggybacking: Gaining access to a network by using a legitimate user’s connection, often when they don’t log out before walking away.
#Computer worm virus free#
Phreaking: When phone networks are hacked in order to make free calls or have calls charged to a different account. Some specific techniques include spear phishing (targets specific people or departments), whale phishing (targets important people like CEOs), and SMiShing (phishing via text messages) and vishing (voice phishing that takes place over the phone, usually through impersonation).
Phishing: When cybercriminals try to get sensitive information from you, like credit card numbers and passwords. Pharming: When website traffic is redirected to a bogus website, usually an e-commerce or banking site. Most passwords are encrypted now so this technique is less of a threat.
#Computer worm virus password#
Password Sniffing (or Password Stealer): malware that examines your network traffic to find usernames and passwords. Malware: Any “ malicious soft ware” designed to secretly access your computer. Keylogger: Spyware (or hardware) that tracks and records keystrokes, particularly passwords and credit card information. Hoax: Message that warns of a non-existent threat, usually related to chain letters and usually harmless. Hijackware: Malware that changes your browser settings to direct you to malicious sites or show you ads. Hacktivism: Hacking for politically or ideologically motivated reasons. Hacking: When someone breaks into a computer or network. Not dangerous but very lucrative.īackdoor: Opens a backdoor into your computer to provide a connection for other malware, viruses, spam, or hackers.Ĭracking: Gaining access into a system specifically to commit a crime. The truth is, you can’t participate in cyberspace without cybercrime touching you in one way or another, so why not understand what you’re talking about?Īdware: Displays ads on your computer. So it’s good to understand the different kinds of crimes out there so you can be alert, protect yourself and your company, and understand what might be going on if your computer or network starts acting weird. No matter what you call it, cybercrime can be a real pain.