1 / 14

What are the Different Types of Malicious Software

Various types of malicious computer software are as follows-<br>Adware, Spyware, Rootkit, Spam and much more.<br>Note:-Run the best antivirus software on your device to keep threats and other vulnerabilities at bay.

Himanshi
Download Presentation

What are the Different Types of Malicious Software

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Different Types of Computer Malware

  2. Malware is a malicious software that gets installed in your device and performs unwanted tasks.

  3. Mainly designed to transmit information about your web browsing habits to the third party

  4. Types of Malware Viruses Trojan Horse SpywareSpam AdwareRootkits ScarewareWorms

  5. Viruses • Software that replicates itself and spreads by damaging and deleting the files. • Virus enters your device via attached images, greeting, audio/video files , downloads etc.

  6. Spyware • Spyware is a program that gets installed without the user’s permission. • It monitors the user’s activities on the internet and transmits that information to the third party.

  7. Adware • Software where advertising banners are displayed while any program is running. • It automatically downloads to your device while browsing any website

  8. Scareware Software that is designed to trick the user into buying or downloading unwanted software.

  9. Worms • Malicious program that make copies of itself on local device, network shares etc. • They make the working of your device slower.

  10. Trojan Horse • A Trojan Horse is a program containing malicious or harmful code. • Entering a computer, it performs various tasks like corrupting files and sending out personal information.

  11. Spam • Method of flooding the internet with the copies of the same message • It is for the purpose of advertising, phishing, spreading malware etc.

  12. Rootkits • Software hidden deep inside your device which remains undetected. • It transmits all your sensitive information

  13. Quick Advise:- Run the best virus protection on your smart device to keep threats and other vulnerabilities at bay.

More Related