Page 35 - iPlus_Ver_2.0_class_7
P. 35
To prevent the attacks of spyware:
• Use anti-spyware (software).
• Avoid exploring the error dialogs on internet.
• Avoid using free deal offers on internet.
• Be sure of the authenticity of a desired program before installing it in your computer.
Ransomware
Ransom is the money demanded to release the hostage kidnapped. Similarly, ransomware is
malicious software used to access the data of the host system illegally by encrypting it. The victim of
the host system has to pay a huge amount of money to the attacker to get back access to their data.
Rootkit
Rootkit is a malware that gains administrator access to the host system. Once the attacker gains
access to the system, the rootkit gets hidden but retains special access to the system. The detection
of rootkit is difficult as it has special access to the system, it bypasses the tracking software.
Backdoor
Backdoor is a type of malicious software which enters the computer bundled with other software
or files. It is used to gain remote access to the host computer.
i + THE MOST DANGEROUS MALWARES KNOWN
• Wabbit Virus (1974) makes multiple copies of itself until the system slows down and crashes.
• ILOVEYOU Virus (2000) worked by sending a fake “love letter” that looked like a harmless
text file.
• Code Red Worm (2001) would spread itself with the message: “Hacked By Chinese!”
• Mydoom Worm (2004) scraped addresses from infected machines, then sent copies of itself
to those addresses.
• Storm Worm (2007) attacked millions of computers with an email about approaching bad
weather.
• Zeus, also known as Zbot Trojan horse (2007) was made with an intention to steal banking
information of United States Department of Transportation.
• Emotet (2014) is considered one of the most destructive and dangerous Trojans. It spreads
through spam emails to steal banking information.
• Pegasus (2016) is commercial spyware. It secretly infects a smartphone (Android or iOS) and
tracks the device completely for every action.
Info Byte
Most of the malware programs are distributed over the Internet, often bundled with
other software.
The best way to guard against malware is to install antivirus software.
33
Computer Virus

