SlideShare a Scribd company logo
1 of 42
MALWARE
LIST OF MALWARE
 Virus
 Worms
 Trojans
 Logic Bombs
 Rootkits
 Backdoors
 Botnet
 Spyware
 Adware
 Key Loggers
 Rogue security software
 Ransomware
 Browser Hijacker
VIRUS
 It is a malicious computer code that reproduce itself on
the same computer.
Attacks:
 A virus first inserts itself into a computer files, these
are several types:
1.Erases files from hardware.
2.Reformatted the hard disk drive.
3.Turned off the computer’s security settings.
4.Caused to crash a computer repeatedly.
VIRUS PROTECTION
 Install an antivirus program.
 Don't open email attachments unless you're
expecting them.
 Keep your computer updated.
 Use a firewall. Windows Firewall (or any other
firewall) can help alert you to suspicious activity if a
virus attempts to connect to your computer.
VIRUS REMOVAL
 Enter Safe Mode. Keep your PC disconnected from
the Internet, and don't use it until you're ready to
clean your PC.
 Delete Temporary Files. Now that you're in Safe
Mode, you'll want to run a virus scan.
 Download Malware Scanners.
 Run a Scan With Malwarebytes.
WORMS
 A Worm is a malicious computer code that
reproduce itself on the same computer and on the
other computer by using the networks.
Attacks:
It searches for the same vulnerabilities in other
computer’s in a network and effects them.
WORM PROTECTION
 Scanning any potentially suspicious files with an
antivirus solution.
 Keeping antivirus programs up-to-date.
Worm Removal:
 Enter Safe Mode. Keep your PC disconnected from
the Internet, and don't use it until you're ready to
clean your PC.
 Download Malware Scanners.
TROJANS
 It is an executable program, advertisers performing
one activity, but actually does something else which
may effects the computer.
Attacks:
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers or
computer networks
TROJANS PROTECTION
 Protect your computer with strong security
software.
 Enable automatic Windows updates.
 Be careful when engaging in peer-to-peer (P2P)
file-sharing.
 Download the latest version of your browser.
TROJAN REMOVAL
 Disable System Restore.
 Install an anti-malware program, if you haven’t
already.
 Reboot into Safe Mode.
ROOTKIT
 Rootkit is a set of software used by attacker to hide
the actions of the other types of malicious software.
By hiding Log-in records.
Attacks:
They alter or replace OS files with modified versions
designed to ignore malicious activities.
ROOTKIT PROTECTION
 Disable Auto run windows PC.
 Install tools that will protect the computer from
rootkits.
 Anti Rootkit tools like AVG Anti-Rootkit, Panda Anti-
Rootkit, Malwarebytes Anti-Rootkit.
ROOTKIT REMOVAL
 By using one of the tools named Bitdefender
Rootkit Remover, we can remove Rootkit.
 The Bitdefender Rootkit Remover deals with known
rootkits quickly and effectively and removes from
PC.
LOGIC BOMBS
A logic bomb is a piece of code intentionally inserted
into a software system that will set off a malicious
function when specified conditions are met.
Attacks:
 A dissatisfied employee had counted on this to
cause the company’s stock to drop; the employee
can earn money from the price drop.
 Attackers can also use a combination of spyware
and logic bombs in an attempt to steal your identity
LOGIC BOMBS PROTECTION
 Do not download pirated software -- Logic bombs
can by distributed by exploits that promote software
piracy.
 Do not click on suspicious web links -- Clicking on
an unsafe link may direct you to an infected website
that may host the logic bomb malware.
 Apply patches to other software installed on your
computer- like such as Microsoft Office software,
Adobe products.
LOGIC BOMBS REMOVAL
 Run Malwarebytes Anti-Malware.
 Run the anti spyware removal programs Spybot -
Search & Destroy.
ADWARE
 It is a software program that delivers
advertising unwanted for the users.
 It also performs tracking functions.
Attacks:
 Adware ,it usually includes code that tracks a
user's personal information and passes it on to
third parties, without the user's authorization or
knowledge. This practice has been dubbed
spyware and has prompted an outcry from
computer security and privacy advocates,
including the Electronic Privacy Information
Centre.
ADWARE PROTECTION
 Remove browser add-ons
 You might need to remove add-ons from your
browser:
 Manage add-ons in Internet Explorer
 Disable or remove Add-ons in Firefox
 Uninstall extensions in chrome
ADWARE REMOVAL
 Uninstall Pop-up Ads malicious programs from your
computer
 Remove Pop-up Ads from Internet Explorer, Firefox
and
 Remove Pop-up Ads virus with Malwarebytes Anti-
Malware Free
BROWSER HIJACKER
 Browser hijacking is the modification of a web
browsers’ settings. The term hijacking is used as
the changes are performed without the user's
permission. A browser hijacker may replace the
existing home page, error page, or search page
with its own.
ATTACK:
 Browser hijackers are generally distributed by
downloading shareware or freeware applications
from malicious and unauthorized websites. If you
have clicked any pop-ups or ads link which displays
click ‘Yes’ or ‘No’ then that link might have
downloaded browser hijacker in your PC.
BROWSER HIJACKER PROTECTION
 Remain up to date with Windows security updates
as they help you to improve your computer’s
security and you will be safe.
 Install a good anti-spyware software on your PC
which will act as a shield between your PC and
Browser Hijacker and protect it from any Browser
Hijacker inventions.
 Update your anti-spyware software definitions on a
regular basis at least once a day. This will help you
to detect new Browser Hijacker’s on your PC.
BROWSER HIJACKER REMOVAL
 Scan for Browser Hijacker’s and other threats on
your PC on a regular basis at least once a week.
KEY LOGGERS
A key logger can be hardware or
software.
Attacks:
A key logger inspects keystrikes and send the
information to the attacker.
KEY LOGGERS PROTECTION
 Make sure that no unwanted hardware device is
connected to your computer.
 Install and scan your computer with anti-malware
software.
 keeping track of your authorized programs may be
all you need to do. If there’s a mystery guest on
your control panel.
KEY LOGGERS REMOVAL
 Many software tools can be used to get rid of
keylogging.
 If there is any keylogging device connected your
computer, disconnect it.
 Install absolute keylogger removal tool.
RANSOMWARE
 Ransomware is a type of malware which restricts
access to the computer system that it infects, and
demands a ransom paid to the creator(s) of the
malware in order for the restriction to be removed.
RANSOMWARE PROTECTION
 Keep all of the software on your computer up to
date. Make sure automatic updating is turned on to
get all the latest Microsoft security updates.
 Keep your firewall turned on.
 Don't open spam email messages.
 Scan your computer with the Microsoft Safety
Scanner.
RANSOMWARE REMOVAL
 To detect and remove ransomware and other
malicious software that might be installed on your
computer, run a full-system scan with an
appropriate, up-to-date, security solution. The
following Microsoft products can detect and remove
this threat:
 Windows Defender (built into Windows 8)
 Microsoft Security Essentials
 Microsoft Safety Scanner
BOTNET
Criminals distribute malicious software that can
turn your computer in to a bot also known as
zombie when it occurs it performs automated
task over the internet. They use it to send out
spam emails and messages. If this occurs to
your computer then your computer will get slow
down and you might be helping criminals.
BOTNET PROTECTION
 E-mail with malware as an attachment.
 Drive-by malware.
 Plug-in and application risks.
 Hazard: data storage devices.
BOTNET REMOVAL
 Phrozensoft Mirage Anti-Bot.
 Trend Micro RUBotted.
 Norton Power Eraser.
 BotHunter.
 Avira BotFrei.
BACKDOORS
 A backdoors is a mean of access to a computer
program that bypasses security mechanisms.
Attacks:
 Back door can be an installed program or could be
a modification to an existing program. The installed
program may allow a user log on to the computer
without a password with administrative privileges.
Many programs are available on internet to create
back door attacks on systems. One of the more
popular tools is Back Orifice which is also available
for free download on internet.
BACKDOORS PROTECTION
 Profiling the website's traffic and comparing it
against an extensive database of backdoors.
 Enabling the detection to overcome file obfuscation
and signature mutation.
BACKDOORS REMOVAL
 When AVG real-time antivirus protection detects a
virus in your computer, the AVG Detection window
is displayed, with two options:
 Protect Me: this is the recommended action. It will
remove the threat from your device.
 Ignore the threat: will do nothing to remove the
virus, however the file will be blocked so infection
won't spread.
 It is recommended to perform a full device scan
after dealing with any threat, to make sure it was
successfully deleted.
SPYWARE
Spyware is infiltration software that secretly monitors unsuspecting
users. It can enable a hacker to obtain sensitive information, such
as passwords, from the user's computer. Spyware exploits user
and application vulnerabilities and is often attached to free online
software downloads or to links that are clicked by users.
Attacks:
•Slow computer performance.
• System instability .
• New browser toolbars or menu.
• New shortcuts.
• Hijacked home page.
• Increased pop-ups.
SPYWARE PROTECTION
 The use of system resources, including what
programs are installed on their computers.
 The collection,use,and distribution of personal or
otherwise sensitive information.
 Material changes that affect the user experience
privacy, or system security.
SPYWARE REMOVAL
 Check Installed Programs for items that don't
belong on your computer. Use this method with
extreme caution. Control Panel lists many
programs, most of which are not spyware.
 Reinstall Windows. Some spyware can hide itself
so well that it can't be removed.
ROGUE SECURITY SOFTWARE
 This one deceives or misleads users. It pretends to
be a good program to remove Malware infections,
but all the while it is the Malware. Often it will turn
off the real Anti-Virus software. The next image
shows the typical screen for this Malware program,
Antivirus 2010.
ATTACKS
 Gives a false sense of security.
 Fraudulent transaction.
 Interrupts legitimate security program operations.
 Prevents you from visiting legitimate security
software vendor sites
PROTECT
 The best way to avoid rogues is to prevent them
from being installed in the first place.
 Another way you can protect yourself is to be wary.
Legitimate security companies won’t try to scare
you into using their scanners.
REMOVE
 Don’t pay the fee they ask for – this could create
further problems and expose you to further fraud or
identity theft.
 If you have problems getting rid of a rogue the
following article might help
List of Malwares

More Related Content

What's hot (20)

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
What is malware
What is malwareWhat is malware
What is malware
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
Network security
Network securityNetwork security
Network security
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 

Viewers also liked

Final Project Report Nadar
Final Project Report NadarFinal Project Report Nadar
Final Project Report NadarMaher Nadar
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Malicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic SoftwareMalicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic SoftwareTakahiro Haruyama
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Rhydham Joshi
 
Volatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident ResponseVolatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident ResponseTakahiro Haruyama
 
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documentsREMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documentsRhydham Joshi
 
REMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsREMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsRhydham Joshi
 
Malware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual MachinesMalware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual Machinesintertelinvestigations
 
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
Remnux tutorial-1  Statically Analyse Portable Executable(PE) FilesRemnux tutorial-1  Statically Analyse Portable Executable(PE) Files
Remnux tutorial-1 Statically Analyse Portable Executable(PE) FilesRhydham Joshi
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseTakahiro Haruyama
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

Viewers also liked (17)

SSL Technology
SSL TechnologySSL Technology
SSL Technology
 
Final Project Report Nadar
Final Project Report NadarFinal Project Report Nadar
Final Project Report Nadar
 
Malware protection system
Malware protection systemMalware protection system
Malware protection system
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Malicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic SoftwareMalicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic Software
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
 
Volatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident ResponseVolatile IOCs for Fast Incident Response
Volatile IOCs for Fast Incident Response
 
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documentsREMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
 
REMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of ArtifactsREMnux tutorial-2: Extraction and decoding of Artifacts
REMnux tutorial-2: Extraction and decoding of Artifacts
 
Malware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual MachinesMalware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual Machines
 
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
Remnux tutorial-1  Statically Analyse Portable Executable(PE) FilesRemnux tutorial-1  Statically Analyse Portable Executable(PE) Files
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCase
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similar to List of Malwares

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack ClancyClancy9
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack RaahaugeHerbert0
 

Similar to List of Malwares (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Virus
VirusVirus
Virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus
AntivirusAntivirus
Antivirus
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

List of Malwares

  • 2. LIST OF MALWARE  Virus  Worms  Trojans  Logic Bombs  Rootkits  Backdoors  Botnet  Spyware  Adware  Key Loggers  Rogue security software  Ransomware  Browser Hijacker
  • 3. VIRUS  It is a malicious computer code that reproduce itself on the same computer. Attacks:  A virus first inserts itself into a computer files, these are several types: 1.Erases files from hardware. 2.Reformatted the hard disk drive. 3.Turned off the computer’s security settings. 4.Caused to crash a computer repeatedly.
  • 4. VIRUS PROTECTION  Install an antivirus program.  Don't open email attachments unless you're expecting them.  Keep your computer updated.  Use a firewall. Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus attempts to connect to your computer.
  • 5. VIRUS REMOVAL  Enter Safe Mode. Keep your PC disconnected from the Internet, and don't use it until you're ready to clean your PC.  Delete Temporary Files. Now that you're in Safe Mode, you'll want to run a virus scan.  Download Malware Scanners.  Run a Scan With Malwarebytes.
  • 6. WORMS  A Worm is a malicious computer code that reproduce itself on the same computer and on the other computer by using the networks. Attacks: It searches for the same vulnerabilities in other computer’s in a network and effects them.
  • 7. WORM PROTECTION  Scanning any potentially suspicious files with an antivirus solution.  Keeping antivirus programs up-to-date. Worm Removal:  Enter Safe Mode. Keep your PC disconnected from the Internet, and don't use it until you're ready to clean your PC.  Download Malware Scanners.
  • 8. TROJANS  It is an executable program, advertisers performing one activity, but actually does something else which may effects the computer. Attacks:  Deleting data  Blocking data  Modifying data  Copying data  Disrupting the performance of computers or computer networks
  • 9. TROJANS PROTECTION  Protect your computer with strong security software.  Enable automatic Windows updates.  Be careful when engaging in peer-to-peer (P2P) file-sharing.  Download the latest version of your browser.
  • 10. TROJAN REMOVAL  Disable System Restore.  Install an anti-malware program, if you haven’t already.  Reboot into Safe Mode.
  • 11. ROOTKIT  Rootkit is a set of software used by attacker to hide the actions of the other types of malicious software. By hiding Log-in records. Attacks: They alter or replace OS files with modified versions designed to ignore malicious activities.
  • 12. ROOTKIT PROTECTION  Disable Auto run windows PC.  Install tools that will protect the computer from rootkits.  Anti Rootkit tools like AVG Anti-Rootkit, Panda Anti- Rootkit, Malwarebytes Anti-Rootkit.
  • 13. ROOTKIT REMOVAL  By using one of the tools named Bitdefender Rootkit Remover, we can remove Rootkit.  The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively and removes from PC.
  • 14. LOGIC BOMBS A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. Attacks:  A dissatisfied employee had counted on this to cause the company’s stock to drop; the employee can earn money from the price drop.  Attackers can also use a combination of spyware and logic bombs in an attempt to steal your identity
  • 15. LOGIC BOMBS PROTECTION  Do not download pirated software -- Logic bombs can by distributed by exploits that promote software piracy.  Do not click on suspicious web links -- Clicking on an unsafe link may direct you to an infected website that may host the logic bomb malware.  Apply patches to other software installed on your computer- like such as Microsoft Office software, Adobe products.
  • 16. LOGIC BOMBS REMOVAL  Run Malwarebytes Anti-Malware.  Run the anti spyware removal programs Spybot - Search & Destroy.
  • 17. ADWARE  It is a software program that delivers advertising unwanted for the users.  It also performs tracking functions. Attacks:  Adware ,it usually includes code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge. This practice has been dubbed spyware and has prompted an outcry from computer security and privacy advocates, including the Electronic Privacy Information Centre.
  • 18. ADWARE PROTECTION  Remove browser add-ons  You might need to remove add-ons from your browser:  Manage add-ons in Internet Explorer  Disable or remove Add-ons in Firefox  Uninstall extensions in chrome
  • 19. ADWARE REMOVAL  Uninstall Pop-up Ads malicious programs from your computer  Remove Pop-up Ads from Internet Explorer, Firefox and  Remove Pop-up Ads virus with Malwarebytes Anti- Malware Free
  • 20. BROWSER HIJACKER  Browser hijacking is the modification of a web browsers’ settings. The term hijacking is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page, error page, or search page with its own. ATTACK:  Browser hijackers are generally distributed by downloading shareware or freeware applications from malicious and unauthorized websites. If you have clicked any pop-ups or ads link which displays click ‘Yes’ or ‘No’ then that link might have downloaded browser hijacker in your PC.
  • 21. BROWSER HIJACKER PROTECTION  Remain up to date with Windows security updates as they help you to improve your computer’s security and you will be safe.  Install a good anti-spyware software on your PC which will act as a shield between your PC and Browser Hijacker and protect it from any Browser Hijacker inventions.  Update your anti-spyware software definitions on a regular basis at least once a day. This will help you to detect new Browser Hijacker’s on your PC.
  • 22. BROWSER HIJACKER REMOVAL  Scan for Browser Hijacker’s and other threats on your PC on a regular basis at least once a week.
  • 23. KEY LOGGERS A key logger can be hardware or software. Attacks: A key logger inspects keystrikes and send the information to the attacker.
  • 24. KEY LOGGERS PROTECTION  Make sure that no unwanted hardware device is connected to your computer.  Install and scan your computer with anti-malware software.  keeping track of your authorized programs may be all you need to do. If there’s a mystery guest on your control panel.
  • 25. KEY LOGGERS REMOVAL  Many software tools can be used to get rid of keylogging.  If there is any keylogging device connected your computer, disconnect it.  Install absolute keylogger removal tool.
  • 26. RANSOMWARE  Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
  • 27. RANSOMWARE PROTECTION  Keep all of the software on your computer up to date. Make sure automatic updating is turned on to get all the latest Microsoft security updates.  Keep your firewall turned on.  Don't open spam email messages.  Scan your computer with the Microsoft Safety Scanner.
  • 28. RANSOMWARE REMOVAL  To detect and remove ransomware and other malicious software that might be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products can detect and remove this threat:  Windows Defender (built into Windows 8)  Microsoft Security Essentials  Microsoft Safety Scanner
  • 29. BOTNET Criminals distribute malicious software that can turn your computer in to a bot also known as zombie when it occurs it performs automated task over the internet. They use it to send out spam emails and messages. If this occurs to your computer then your computer will get slow down and you might be helping criminals.
  • 30. BOTNET PROTECTION  E-mail with malware as an attachment.  Drive-by malware.  Plug-in and application risks.  Hazard: data storage devices.
  • 31. BOTNET REMOVAL  Phrozensoft Mirage Anti-Bot.  Trend Micro RUBotted.  Norton Power Eraser.  BotHunter.  Avira BotFrei.
  • 32. BACKDOORS  A backdoors is a mean of access to a computer program that bypasses security mechanisms. Attacks:  Back door can be an installed program or could be a modification to an existing program. The installed program may allow a user log on to the computer without a password with administrative privileges. Many programs are available on internet to create back door attacks on systems. One of the more popular tools is Back Orifice which is also available for free download on internet.
  • 33. BACKDOORS PROTECTION  Profiling the website's traffic and comparing it against an extensive database of backdoors.  Enabling the detection to overcome file obfuscation and signature mutation.
  • 34. BACKDOORS REMOVAL  When AVG real-time antivirus protection detects a virus in your computer, the AVG Detection window is displayed, with two options:  Protect Me: this is the recommended action. It will remove the threat from your device.  Ignore the threat: will do nothing to remove the virus, however the file will be blocked so infection won't spread.  It is recommended to perform a full device scan after dealing with any threat, to make sure it was successfully deleted.
  • 35. SPYWARE Spyware is infiltration software that secretly monitors unsuspecting users. It can enable a hacker to obtain sensitive information, such as passwords, from the user's computer. Spyware exploits user and application vulnerabilities and is often attached to free online software downloads or to links that are clicked by users. Attacks: •Slow computer performance. • System instability . • New browser toolbars or menu. • New shortcuts. • Hijacked home page. • Increased pop-ups.
  • 36. SPYWARE PROTECTION  The use of system resources, including what programs are installed on their computers.  The collection,use,and distribution of personal or otherwise sensitive information.  Material changes that affect the user experience privacy, or system security.
  • 37. SPYWARE REMOVAL  Check Installed Programs for items that don't belong on your computer. Use this method with extreme caution. Control Panel lists many programs, most of which are not spyware.  Reinstall Windows. Some spyware can hide itself so well that it can't be removed.
  • 38. ROGUE SECURITY SOFTWARE  This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010.
  • 39. ATTACKS  Gives a false sense of security.  Fraudulent transaction.  Interrupts legitimate security program operations.  Prevents you from visiting legitimate security software vendor sites
  • 40. PROTECT  The best way to avoid rogues is to prevent them from being installed in the first place.  Another way you can protect yourself is to be wary. Legitimate security companies won’t try to scare you into using their scanners.
  • 41. REMOVE  Don’t pay the fee they ask for – this could create further problems and expose you to further fraud or identity theft.  If you have problems getting rid of a rogue the following article might help