SlideShare a Scribd company logo
1 of 23
MALWARE
(Malicious-Software)
Ask yourself this. This power point presentation is named malware.
Did you run a scan on it before opening.?
 A Malware is a specific set of codes or an
application , specifically designed to harm
and/or to gain access to a targeted computer
, or spread across multiple computers ; over
the use of a network or a data storage device.
Malware is a Malicious
Software
As old as the Software itself
Any harmful piece of program.
 Virus
 Worm
 Trojan horse
 Spyware
 Phishing
The first malware was a Virus
It Appeared in the realms of
computer were ELK Cloner and
Brain virus.
The “ELK Cloner” virus
appeared on Apple MAC in
1982 , and was created by Rich
Skrenta from
Pennsylvania, United States.
FIRST MALWARE OF THE WORLD
The Brain virus was programmed by two
brothers ; Amjad Farooq Alvi and Basit Farooq
Alvi , from Lahore Pakistan in 1986.
 1990 focused targeting on colleges and
universities
 Mid 20th century started targeting businesses
 After the year 2000 target was The Internet !
 To attack or takedown websites
• Destroying the online presence and credibility.
• Financial Theft.
BRIEF HISTORY OF MALWARES.
BRIEF HISTORY OF MALWARES.
The “Worn Outbreak ERA”
From 2000-2003
The “WEB THREAT ERA”
From 2004-2008
 Current Era of Malwares as termed by
experts:
BRIEF HISTORY OF MALWARES.
 Evolution of Malware over (2003-2010):
 Virus replicates into the network by creating copies
of itself in the computer files.
◦ Need a file to survive, infect and replicate
 Virus is designed to damage or read data on
computers or cause interruptions in work
 Melissa virus is a top known virus.
• Self duplicating malware that spreads out independentl
• Eats the Network
• Famous of all time and first Worm– Morris Worm
• Stuxtnet Worm !
 The Trojan Horse by the Greeks
 Hides in a legitimate software
 Tricks users to install it
 Gains privileged access to the OS
 Makes a botnet
 Non self replicating
 NetBus is a well known trojan from 1988
 As the name suggests SPYware!
 Steals information
 Hard to detect
 SpyAnytime, CASE, GATOR are spywares
 Pretend Play!
 Get financial or personal information
 Corporate espionage
 Fake calls and emails
 Common target today is social networking sites
Malwares will always be Chasing you!
Adopt layers of security for defense
◦ Anti Virus and Scans
◦ Install software from trusted vendors
◦ Avoid opening unknown attachments
◦ Do not insert media on known infected computer
◦ Clean out old files
Keep up your security shields
◦ Always re confirm source
◦ Monitor network traffic
◦ Audit logs
◦ Keep OS updated
◦ All other common security measures
KEEP YOUR GUARD UP
Malwares are now not
restricted to
computers only ,
these have made their
way into the world of
cell phones and
tablets.
Major affecting the
mobiles containing
the Android and IOS
operating system.
STATISTICS ; MALWARE , Type.
Malware Distribution by type:
In order to countermeasure the threats of
malware , the user should:
• Installing Anti-Malware
Applications.
• Often Get the data drive
Scan and analyzed.
• Gaining basic knowledge
about the way malwares
work.
• Installing Basic internet
Security Applications.

More Related Content

What's hot

Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

What's hot (20)

What is malware
What is malwareWhat is malware
What is malware
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Network security
Network securityNetwork security
Network security
 
Web security
Web securityWeb security
Web security
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Software security
Software securitySoftware security
Software security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Https presentation
Https presentationHttps presentation
Https presentation
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Email security
Email securityEmail security
Email security
 
Email security
Email securityEmail security
Email security
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Viewers also liked

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 

Viewers also liked (20)

MR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressMR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPress
 
Anti-Virus Evasion techniques and Countermeasures
Anti-Virus Evasion techniques and CountermeasuresAnti-Virus Evasion techniques and Countermeasures
Anti-Virus Evasion techniques and Countermeasures
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Malware
MalwareMalware
Malware
 
Dos threats and countermeasures
Dos threats and countermeasuresDos threats and countermeasures
Dos threats and countermeasures
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Processing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceProcessing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerce
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Big Data For Flight Delay Report
Big Data For Flight Delay ReportBig Data For Flight Delay Report
Big Data For Flight Delay Report
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPTBIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
 
Ipsec
IpsecIpsec
Ipsec
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 

Similar to Common malware and countermeasures

computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 

Similar to Common malware and countermeasures (20)

Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Malware
MalwareMalware
Malware
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
computer viruses
computer virusescomputer viruses
computer viruses
 
MALWARE
MALWAREMALWARE
MALWARE
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
information about virus
information about virusinformation about virus
information about virus
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Malicious
MaliciousMalicious
Malicious
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Common malware and countermeasures

  • 1.
  • 2. MALWARE (Malicious-Software) Ask yourself this. This power point presentation is named malware. Did you run a scan on it before opening.?
  • 3.  A Malware is a specific set of codes or an application , specifically designed to harm and/or to gain access to a targeted computer , or spread across multiple computers ; over the use of a network or a data storage device.
  • 4. Malware is a Malicious Software As old as the Software itself Any harmful piece of program.
  • 5.  Virus  Worm  Trojan horse  Spyware  Phishing
  • 6. The first malware was a Virus It Appeared in the realms of computer were ELK Cloner and Brain virus. The “ELK Cloner” virus appeared on Apple MAC in 1982 , and was created by Rich Skrenta from Pennsylvania, United States. FIRST MALWARE OF THE WORLD
  • 7. The Brain virus was programmed by two brothers ; Amjad Farooq Alvi and Basit Farooq Alvi , from Lahore Pakistan in 1986.
  • 8.  1990 focused targeting on colleges and universities  Mid 20th century started targeting businesses  After the year 2000 target was The Internet !  To attack or takedown websites • Destroying the online presence and credibility. • Financial Theft. BRIEF HISTORY OF MALWARES.
  • 9. BRIEF HISTORY OF MALWARES. The “Worn Outbreak ERA” From 2000-2003 The “WEB THREAT ERA” From 2004-2008
  • 10.  Current Era of Malwares as termed by experts: BRIEF HISTORY OF MALWARES.
  • 11.
  • 12.  Evolution of Malware over (2003-2010):
  • 13.
  • 14.  Virus replicates into the network by creating copies of itself in the computer files. ◦ Need a file to survive, infect and replicate  Virus is designed to damage or read data on computers or cause interruptions in work  Melissa virus is a top known virus.
  • 15. • Self duplicating malware that spreads out independentl • Eats the Network • Famous of all time and first Worm– Morris Worm • Stuxtnet Worm !
  • 16.  The Trojan Horse by the Greeks  Hides in a legitimate software  Tricks users to install it  Gains privileged access to the OS  Makes a botnet  Non self replicating  NetBus is a well known trojan from 1988
  • 17.  As the name suggests SPYware!  Steals information  Hard to detect  SpyAnytime, CASE, GATOR are spywares
  • 18.  Pretend Play!  Get financial or personal information  Corporate espionage  Fake calls and emails  Common target today is social networking sites
  • 19. Malwares will always be Chasing you! Adopt layers of security for defense ◦ Anti Virus and Scans ◦ Install software from trusted vendors ◦ Avoid opening unknown attachments ◦ Do not insert media on known infected computer ◦ Clean out old files
  • 20. Keep up your security shields ◦ Always re confirm source ◦ Monitor network traffic ◦ Audit logs ◦ Keep OS updated ◦ All other common security measures KEEP YOUR GUARD UP
  • 21. Malwares are now not restricted to computers only , these have made their way into the world of cell phones and tablets. Major affecting the mobiles containing the Android and IOS operating system.
  • 22. STATISTICS ; MALWARE , Type. Malware Distribution by type:
  • 23. In order to countermeasure the threats of malware , the user should: • Installing Anti-Malware Applications. • Often Get the data drive Scan and analyzed. • Gaining basic knowledge about the way malwares work. • Installing Basic internet Security Applications.

Editor's Notes

  1. MALWARE is basically a merge of two words. Malicious and Software.
  2. Initially the term “Malware was used in the sense of computers” but as technology progressed , malwares made their way into the realms of cell phones and any other computing device , with a standard OS running into it . For example an interesting fact is that certain devices like a GPS mapping device , or a house security devices are also prone to specialized malware attacks , but are less common than the standard computer counterparts.
  3. Malware is a broad term used for a Malicious Software and is as old as the Software itself. Without any technical details, any harmful piece of program is a malware. The way that particular malicious software / malware is designed to cause damage and spread into the system or network defines the type of malware. Much in same way as we define a Software as desktop based application, web application, web service, code executable etc. Similarly, malwares; based on their nature and affects, are defined into
  4. VirusWormTrojan horseSpywarePhishingApart from the difference in these types, all malwares cause harm in one way or another.
  5. Although the functionalities that a virus has were discovered way before ELK Cloner , these were never meant to harm data on a device , and were either appeared by an accident or were by-products of experimentations.An interesting fact about the ELK Cloner is that it was not actually intended to harm any computer , rather it was termed to be prank among students.
  6. The main intention of the malware was to replace the booting label of a floppy disk , to replace by a message of their own.Just like Vandalism , they set the tracks for electronic vandalism. The brothers now run a legal and fruitful internet Service provider business , ironically called the “BRAIN TELECOMMUNICATION LIMITED”.Their message that they replaced with the booting message of a floppy device was “Welcome to the Dungeon (c) 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today - Thanks GOODNESS!! BEWARE OF THE er..VIRUS : this program is catching program follows after these messages....$#@%$@!!”
  7. As time progressed , the aggressiveness of these malwares increased. Up until 1990s the malwares were restricted to college and university as pranks and jokes.The middle of the twentieth century , the malwares started affecting businesses and even damaged the hardware of the devices.After the millennium , Many websites were also attacked , hindering damage on the users of these webpages.Fraud and online hacking using malware for the purpose of financial theft boomed in the decade.Online Bank Hacking and Social engineering also increased.
  8. Most experts termed the timeline as ERAs of Malware Evolutions.From 2000 till 2003 is termed as the era of the “WORM OUTBREAK” Focusing mostly on spreading Malwares.From 2004 till 2008 is termed as the era of the “WEB THREAT”. Focusing mostly on online financial thefts and frauds.Currently in 2013 , this era is considered to be the “SOCIAL ATTACKS ERA”
  9. This era is based on the platform based malware attacks , as the social networks have provided the option of go-ready sensitive information of an unexperienced user online .
  10. Simba.B : Root virus Responsible for gathering users financial Information and sabotaging data.Fake Alert.D. Trojan Malware responsible for data theft and data destruction.Ranson.BE78: Virus responsible for giving illegal access to a users database , to a hacker.Zbot.ANQ: Deadly virus responsible for corrupting important OS related registry files. This virus is specifically hard to detect.
  11. Depicting the exponential increase in the evolution in malware from the years 2008 to 2010.<add some stats for 2013 OR just add a line here to state what is the %age increase of malware from 2010 to 2013 >
  12. Without the proper knowledge , internet is not actually a safe place for a casual surfer.
  13. The distinguishing feature of Virus is that it is programmed to replicate itself and spread in the computer and network by copying itself into neighboring files. It is not a standalone malware and needs to reside in computer files to replicateVirus usually affects the CPU cycles, corrupts the infected files, logs keystrokes , display error / spam messages on the computer screens or when you open a file and most harmful of all, it resides in the boot sector (called root kit virus) and never goes away unless a fresh copy of OS is installed. The Melissa virus, written by David L Smith in homage to a Florida stripper, was the first successful email-aware virus and inserted a quote from The Simpsons in to Word documents. Smith was later sentenced to jail for causing over $80 million worth of damage
  14. Distinguishing feature of worm is that it is self replicating and does not need to reside in files to spread out. Usually it affects mostly Network services like bandwith by generating extra traffic or exploiting vulnerability of the networkMorris worm was the world’s first big time damaging worm that spread over the internet back in 1988One of the most recent worms is the Stuxtnet worm that started in 2012 to destroy the Iran’s nuclear system and is still to date active. Iran is trying to over come it
  15. The concept of a trojan malware is stolen from the Trojan horse that was used to gain access into the city of Troy that was otherwise too strong to get into. Same concept applies. Malware is hidden in a ligit software piece or a file with a back door for the virus to attack. Users think it is a valid file and install it. Its main purpose is to gain a privileged access to the OS and then elicit the access into the systems and makes it its slave to do damages to other systems. Netbus was introduced in 1988 and makes windows machines its slaveZues steals information by keystroke logging and was introduced in 2007
  16. Spyware is a malware program that gets installed on the computer through a file downloaded, game installed, email opened or installed on the computer by an attackerMainly it steals information: It logs all keystrokes, sends activity reports back to the hacker, monitors all traffic, copies data onto a remote computerVery hard to get rid of as they are hidden just like its hard to spot a spy amongst a friendly group of peopleSpyAnytime, CASE, GATOR are spywares that are readilyavaialble
  17. Phishing is when some one wants to get credit card information or user ID passwords or other such information to gain access into a system, the person will pretend to be a legitimate receiver of that information by faking its identity. E.g a fake call made to the support team to say that “this is Mr smith’ and my password is expired and email is not working so please tell me my new password over phone” Fake emails are also common to trick users into clicking links and supplying user Ids which are cachted by the hackerA Common target today is social networking sites. In 2006 , a phishing emails tricked users of myspace to give out their user IDs and passwords
  18. The best way to protect from Viruses is to ensure:Install and keep updated a good anti virus like Symmetric, nortronAlways scan USBs, DVDs before, preferably scan on another machine before plugging into your PCNever open emails or attachments that are not from a trusted sourceScan the emails and attachments specially if graphic filesAlways install software from their vendor’s original URLsWhen installing a new software, always scan it for virusesIf you know a usb is infected, or has been repeatedly plugged into a public network like a net cafe, never plug it inRemove unwanted files from computer as dormant files are trojansAlways re confirm source of an email and call asking for information
  19. Always re confirm source of an email and call asking for informationFor worms affecting networks, have network monitoring and scanning enabledHave system logging enabled to track keyloggers. Although sometimes they delete logs as wellAlways have patched systems as few worms explout known vulerabilities in OSHave good security practices
  20. As technology has progressed , we receive the ease of managing our finances online , on the go and mobile ; using our cell phones , which have also come under attack of a number of different malwares , specifically designed to spy on the user as he lives his life.
  21. Trojan horses rank as the most number of malware attacks overall.<remove the date from the pic>
  22. Install certified anti-virus and anti-spyware software in fresh copies of their OS.Do not accept random files from untrusted sources over the internet.Get the data drive Scan and analyzed by appropriate malware detecting soft-wares.Gaining basic knowledge , about how to operate several portable devices securely. (#Major reason of Malware Spread)Installing Basic internet Security Applications.