Is malicious software placed on a computer without the knowledge of the owner?

Summary: This article provides information about different types of Viruses, Spyware and Malware that can infect your Dell computer?See less This article provides information about different types of Viruses, Spyware and Malware that can infect your Dell computer?

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms


This article provides information about the different types of Viruses, Spyware, and Malware that can infect your computer.



A computer virus is a piece of software that can 'infect' a computer, install itself and copy itself to other computers, without the users knowledge or permission. It usually attaches itself to other computer programs, data files, or the boot sector of a Hard drive.

Malware is short for malicious software. Malware is the name that is given to any type of software that could harm a computer system, interfere with and gather a user's data, or make the computer perform actions without the owner's knowledge or permission.

Trojan horse

A type of malware that uses malicious code to install software that seems ok, but is hidden to create back doors into a system. This typically causes loss or theft of data from an external source.

Worm

Unlike a virus, a worm, is a standalone piece of malicious software that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security flaws on the target system to allow access.

Spyware is software that aids in gathering information about a person or organization without their knowledge. Spyware can monitor and log the activity that is performed on a target system, like log key strokes, or gather credit card and other information.

Adware

Adware is software which can automatically cause pop-up and banner adverts to be displayed in order to generate revenue for its author or publisher. A lot of freeware uses Adware but not always in a malicious way. If it was malicious, it would then be classed as spyware or malware.

Back to Top


  • Install an anti-virus program and keep it up-to-date and regularly run scans.
  • Install an anti-malware program to stop software installing without your knowledge.
  • Never download and install software from the Internet unless you are certain it is from a trusted source.
  • Do not open email attachments unless you have scanned them first, even a picture can carry a virus.
  • Do not trust cracked or hacked software as they often contain malware, Trojans.

For more information please refer to this article - Protect your computer or remove virus, spyware or other malware in Microsoft Windows

Most current virus protection software handles worms, Trojan horses, and bots, as well as viruses. The most important thing to keep in mind, however, is that there is an ever-escalating battle between those who write malware and those who produce the virus protection software. As soon as a new threat is identified, the software developers rush to add the new malware to their protection database; the malware producers then write new malware that is typically more powerful and sophisticated than previous releases. You can never be completely safe from malware because there is always a lag, however short, between the detection of a new piece of malware and the updating of virus protection software to handle that malware. The best you can do is to update the database that accompanies your virus protection software regularly.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128043998000235

Network Security

Derrick Rountree, in Security for Microsoft Windows System Administrators, 2011

Spyware

Spyware is a type of malware used to spy on user activity on a computer. Spyware will gather information on users’ habits such as browsed Web sites, accessed applications, and downloaded programs. This information is then sent to an attacker, so he or she knows what attacks can be perpetrated on a system. Spyware can have even more direct effects, like stealing of passwords and credit card information. This type of information can lead to direct financial benefits for an attacker. Spyware is generally not self-proliferating. It is not spread from infected system to infected system. Usually, spyware is downloaded from a Web site or server that the user believes contains beneficial software. In fact, many times, spyware will be bundled in a download with some sort of legitimate software.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978159749594300003X

Security and Compliance

Bill Holtsnider, Brian D. Jaffe, in IT Manager's Handbook (Third Edition), 2012

Malware

Malware is a category name to define software that causes problems. This can include viruses, adware, and spyware. Malware can degrade system performance, expose confidential information, distribute spam, etc. Specific types of malware include:

Macro viruses. Viruses that use commands (macros) in application files (e.g., Excel and Word) to replicate themselves and do damage.

Worms. Self-contained programs that replicate themselves usually via the network or e-mail attachments.

Adware. Software that installs itself on a workstation for the purpose of displaying ads to the user. Users often unknowingly install adware when they download applications from the Web.

Spyware. Software that monitors a user's activity, often to collect account numbers, passwords, etc. Spyware often works in tandem with adware as the ads shown may be related to the activity detected by the spyware. Like adware, spyware is also frequently installed by the user unknowingly when downloading applications from the Web.

Trojan horses. Programs that appear to be legitimate, but in fact are malicious.

Backdoor Trojans: Trojan horse programs that allow a hacker to control your computer remotely.

Page Hijackers: Akin to the purposes of adware, they covertly redirect browsers to specific web pages.

Rootkits: A set of modifications to the operating system that is designed primarily to hide malicious activity. Because the rootkit software essentially resides in a modification of the operating system, it's extremely difficult to detect, and it also continually checks on itself to see that the compromised files are still compromised and reinfects as needed. In addition to being very difficult to detect, they're equally hard to remove.

Key loggers: Small applications that reside on a computer to record key strokes. These are used to capture passwords and confidential information (e.g., credit card numbers).

Of particular concern with malware is what is known as a Zero-Day attack, which is malicious code that takes advantage of a security vulnerability before there's a fix for it. In some cases, the malicious code is released even before there is public knowledge of the vulnerability.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124159495000089

Malware Attacks

Carl Timm, Richard Perez, in Seven Deadliest Social Network Attacks, 2010

Publisher Summary

Malware comes in numerous shapes, sizes, and purposes ranging from viruses, to spyware, to bots. There really are two different types of malware. Malware can either be infectious or concealing malware. Infectious malware is malware that spreads—software that will replicate itself from one user to the next. There are two primary items that are considered infectious malware, which include viruses—software that has infected some executable and causes the executable, when run, to spread the virus to other executable software, and worms—software that infects a computer, and then spreads to other computers. The concealment software includes Trojan Horses, rootkits, backdoors, and keylogger. Cross-site scripting (XSS) is an attack that forces a user's Web browser to execute an attacker's code. The steps followed by an attacker for a basic XSS attack include that an attacker finds an XSS hole in Site A and leaves it there for the victim. Another step is that a victim visits Site A with the XSS. Site A sends many requests through the victim's browser to Site B via a META refresh to hide the referrer without his knowledge. Next step, eventually the victim finds a hole, which is then sent to Site C without the victim's knowledge. Another step is that the victim sends successful attempts to hack Site B to Site C, where they are logged. Last step, the Webmaster of Site B becomes aware of the attacks on their Web site.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495455000021

Client-Side Attacks Defined

Sean-Philip Oriyano, Robert Shimonski, in Client-Side Attacks and Defense, 2012

Malware

Malicious software (shortened to malware) is any software that causes damage or lost resources when used on any system it is purposely or inadvertently installed on. In this attack we are concerned with downloading malware specifically designed to alter the system in some way, usually via scripts from a web page visited by a client user. A typical scenario would involve, a malicious web page hosts some sort of malware and uses mass emailing, spam, social engineering or any other method to invite the user to download and execute the malware. A common example of such a technique is to use video codec that contains embedded malware, when the victim visits the site they are informed that downloading the codec is a requirement to view the material (Adult Pornography sites are a common delivery mechanism). Once the victim downloads and installs the malware, the attacker has gained control of the system. Drive-by-download versions of this attack do not even require the user to manually install anything as the malware is automatically downloaded and installed on a user’s system without their knowledge. These attacks usually trigger having a user merely visit a web page.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495905000018

Introduction to practical security and performance testing

Chris Chapman, in Network Performance and Security, 2016

Keyloggers

A keylogger is a code that is installed by malware and sets on a device that has keyboard input (like a PC) and records keystrokes. The hope of the keylogger is that it will capture user login credentials, credit card number, government ID numbers, which can later be sold or used. Keylogger can be deployed by botnets, or themselves be deployed. Variants of keyloggers will look at other inputs and records. For example, variant code may listen to your built-in microphone or record video from the integrated camera (or just take periodic snapshots).

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128035849000019

Reporting and Summarization

Anton Chuvakin, ... Chris Phillips, in Logging and Log Management, 2013

Malware Activity Reports

These reports summarize various malicious software activities and events likely related to malicious software.

Why They Are Important

Malicious software in various forms remains one of the key threat vectors for today’s organizations, large and small. Given that anti-virus tools have been dropping in efficiency of stopping malware for the last few years, other information sources such as logs must be used for fighting malware.

Specific Reports

Key reports in this category are:

Malware detection trends with outcomes: a basic report with a summary or a trend of malicious software detection, also showing the system and the outcome (cleaned or left alone) is a good starting point.

Detect-only events from anti-virus tools: all anti-malware tools log the cases where malicious software was detected but not cleaned (for various reasons); such logged “leave-alones” have helped many organization to avoid massive damage.

All anti-virus protection failures: given that today’s malicious software is well equipped for fighting anti-virus tools, all crashes, protecting engine unloads, update failures, etc. must be logged and reviewed.

Internal connections to known malware IP addresses: one can run this incredibly useful report using their logs (such firewall or other) and a public blacklist of IP address; such simple approach can stop the organization from losing valuable data to malware operators.

Least common malware types: along with other “Bottom 10” (as opposed to “Top 10”) reports, this presents a useful insight into unusual and thus possibly damaging malicious software in your organization.

Is malicious software designed to infiltrate or damage a computer system without the owner's knowledge?

Malware is short for "malicious software." It is software designed to infiltrate or damage a computer, server, computer network, or personal device without the owner's informed consent.

What is considered malicious software?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
Spyware is software installed without your knowledge or consent that can monitor your online activities and collect personal information while you're online. Some kinds of spyware, called keyloggers, record everything you key in—including your passwords and financial information.

What is malicious software and how does it work?

The term "malware" refers to harmful software that disrupts or manipulates an electronic device's normal operation. Malware can infect personal computers, smartphones, tablets, servers and even equipment — basically any device with computing capabilities. The first form of malware ever developed was the computer virus.