Malware , Trojans & Slurpware Varun Arora www.varunarora.in | varun@varunarora.in
What is Malware? <ul><li>Mal icious +  Soft ware </li></ul><ul><li>Made to cause harm  </li></ul><ul><li>Comes bundled wit...
Trojan <ul><li>Malware that appears to perform a desirable function but in fact performs undisclosed malicious functions. ...
What a Trojan can do? <ul><li>Erasing or overwriting data on a computer </li></ul><ul><li>Re-installing itself after being...
Slurpware <ul><li>The newest term in Internet security threats </li></ul><ul><li>It's when all the effective Internet atta...
References: <ul><li>http://en.wikipedia.org/wiki/Trojan_horse_(computing) </li></ul><ul><li>http://www.webopedia.com/TERM/...
THANK YOU!! www.varunarora.in | varun@varunarora.in
Upcoming SlideShare
Loading in...5
×

Malware, Trojans and Slurpware

992

Published on

Presentation on the basics of Trojans, Malwares, Slurpwares

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
992
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
64
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Malware, Trojans and Slurpware

  1. 1. Malware , Trojans & Slurpware Varun Arora www.varunarora.in | varun@varunarora.in
  2. 2. What is Malware? <ul><li>Mal icious + Soft ware </li></ul><ul><li>Made to cause harm </li></ul><ul><li>Comes bundled with other programs </li></ul><ul><li>Types </li></ul><ul><ul><li>Adware </li></ul></ul><ul><ul><ul><li>Adware is the class of programs that place advertisements on your screen. </li></ul></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><ul><ul><li>Send information about you and your computer to somebody else. </li></ul></ul></ul><ul><ul><li>Hijackers </li></ul></ul><ul><ul><ul><li>Hijackers take control of various parts of your web browser, including your home page, search pages, and search bar. </li></ul></ul></ul><ul><ul><li>Toolbars </li></ul></ul><ul><ul><ul><li>Toolbars plug into Internet Explorer and provide additional functionality such as search forms or pop-up blockers. </li></ul></ul></ul><ul><ul><li>Dialers </li></ul></ul><ul><ul><ul><li>Dialers are programs that set up your modem connection to connect to a 1-900 number. </li></ul></ul></ul>www.varunarora.in | varun@varunarora.in
  3. 3. Trojan <ul><li>Malware that appears to perform a desirable function but in fact performs undisclosed malicious functions. </li></ul><ul><li>Types </li></ul><ul><ul><li>Remote Access </li></ul></ul><ul><ul><li>Data Sending </li></ul></ul><ul><ul><li>Destructive </li></ul></ul><ul><ul><li>Proxy </li></ul></ul><ul><ul><li>FTP </li></ul></ul><ul><ul><li>Security Software Disabler </li></ul></ul><ul><ul><li>DoS Attacks (Denial of Service Attacks) </li></ul></ul>www.varunarora.in | varun@varunarora.in
  4. 4. What a Trojan can do? <ul><li>Erasing or overwriting data on a computer </li></ul><ul><li>Re-installing itself after being disabled. </li></ul><ul><li>Upload and download files </li></ul><ul><li>Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context </li></ul><ul><li>Falsifying records of downloading software, movies, or games from websites never visited by the victim. </li></ul><ul><li>Allowing remote access to the victim's computer. This is called a RAT ( remote access trojan ) </li></ul><ul><li>Spreading other malware, such as viruses (this type of trojan horse is called a 'dropper' or 'vector) </li></ul><ul><li>Logging keystrokes to steal information such as passwords and credit card numbers </li></ul><ul><li>slowing down your computer </li></ul><ul><li>displaying pornographic sites </li></ul>www.varunarora.in | varun@varunarora.in
  5. 5. Slurpware <ul><li>The newest term in Internet security threats </li></ul><ul><li>It's when all the effective Internet attack elements come together to potentially steal a lot of money </li></ul><ul><li>'organized crime' </li></ul>www.varunarora.in | varun@varunarora.in
  6. 6. References: <ul><li>http://en.wikipedia.org/wiki/Trojan_horse_(computing) </li></ul><ul><li>http://www.webopedia.com/TERM/T/Trojan_horse.html </li></ul><ul><li>http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=57701972 </li></ul><ul><li>http://seclab.cs.ucdavis.edu/projects/history/papers/ande72.pdf </li></ul><ul><li>http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf </li></ul>www.varunarora.in | varun@varunarora.in
  7. 7. THANK YOU!! www.varunarora.in | varun@varunarora.in
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×