Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Malware, Trojans and Slurpware


Published on

Presentation on the basics of Trojans, Malwares, Slurpwares

Published in: Technology
  • Be the first to comment

Malware, Trojans and Slurpware

  1. 1. Malware , Trojans & Slurpware Varun Arora |
  2. 2. What is Malware? <ul><li>Mal icious + Soft ware </li></ul><ul><li>Made to cause harm </li></ul><ul><li>Comes bundled with other programs </li></ul><ul><li>Types </li></ul><ul><ul><li>Adware </li></ul></ul><ul><ul><ul><li>Adware is the class of programs that place advertisements on your screen. </li></ul></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><ul><ul><li>Send information about you and your computer to somebody else. </li></ul></ul></ul><ul><ul><li>Hijackers </li></ul></ul><ul><ul><ul><li>Hijackers take control of various parts of your web browser, including your home page, search pages, and search bar. </li></ul></ul></ul><ul><ul><li>Toolbars </li></ul></ul><ul><ul><ul><li>Toolbars plug into Internet Explorer and provide additional functionality such as search forms or pop-up blockers. </li></ul></ul></ul><ul><ul><li>Dialers </li></ul></ul><ul><ul><ul><li>Dialers are programs that set up your modem connection to connect to a 1-900 number. </li></ul></ul></ul> |
  3. 3. Trojan <ul><li>Malware that appears to perform a desirable function but in fact performs undisclosed malicious functions. </li></ul><ul><li>Types </li></ul><ul><ul><li>Remote Access </li></ul></ul><ul><ul><li>Data Sending </li></ul></ul><ul><ul><li>Destructive </li></ul></ul><ul><ul><li>Proxy </li></ul></ul><ul><ul><li>FTP </li></ul></ul><ul><ul><li>Security Software Disabler </li></ul></ul><ul><ul><li>DoS Attacks (Denial of Service Attacks) </li></ul></ul> |
  4. 4. What a Trojan can do? <ul><li>Erasing or overwriting data on a computer </li></ul><ul><li>Re-installing itself after being disabled. </li></ul><ul><li>Upload and download files </li></ul><ul><li>Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context </li></ul><ul><li>Falsifying records of downloading software, movies, or games from websites never visited by the victim. </li></ul><ul><li>Allowing remote access to the victim's computer. This is called a RAT ( remote access trojan ) </li></ul><ul><li>Spreading other malware, such as viruses (this type of trojan horse is called a 'dropper' or 'vector) </li></ul><ul><li>Logging keystrokes to steal information such as passwords and credit card numbers </li></ul><ul><li>slowing down your computer </li></ul><ul><li>displaying pornographic sites </li></ul> |
  5. 5. Slurpware <ul><li>The newest term in Internet security threats </li></ul><ul><li>It's when all the effective Internet attack elements come together to potentially steal a lot of money </li></ul><ul><li>'organized crime' </li></ul> |
  6. 6. References: <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul> |
  7. 7. THANK YOU!! |