Top 10 Computer Viruses And How They Work

Attacks are categorized and divided by the way they infect and damage they cause, but then within each “group” may have variants as the cyber criminals are changing slightly to avoid detection by antivirus. The Spanish company VASS a journey through the different types of cyber attacks:

1 – Adware:

adware is software that displays ads. ” The adware are usually installed without our desire.Nobody wants to grind with constantly advertising while using the computer , “Felix Molina, head of Security Consulting VASS explains. ” The adware tend to track our computer use for display advertising that has to do with our searches in different search engines or related sites visited. “

2 – Spyware:

Spyware is a spyware that collects information from a computer “After obtaining the data, transmitted to an external party without the knowledge or consent of the computer owner,” says Felix Molina.

3 – Malware:

This is code designed by cyber criminals aim to disrupt the normal functioning of the computer without the permission or knowledge of the user. This type of virus can destroy files on your hard disk or corrupted files that have hosted with invalid data.

4 – Ransomware:

This practice is believed to grow in 2015, particularly focusing on mobile “ , says Felix Molina, head of Security Consulting VASS. It is that the pirate blocking the smartphone with a message requesting a ransom to free him. The user has to pay such redemption in the Bitcoin digital currency that is not traceable and anonymous hacker is maintained.

5 – Worms:

It has the ability to replicate in your system, so your computer could send hundreds or thousands of copies of itself, creating a devastating effect on a large scale.

6 – Trojan:

This is a type of program that, when run, gives an attacker remote access to the infected computer.

7 – Denial of service:

“It consists in an attack on a computer system or network that causes a service or resource that is inaccessible to legitimate users” , explains the head.

8 – Backdoor:

This is a special sequence in the programming code, by which you can avoid the security systems of the algorithm (authentication) to access the system.

9 – Phishing:

It is a form of attack through an email. Hackers are able to fit you and / or your business to convince you to click on links or to enter confidential data that will eventually install malicious code on your computer.  “Educating employees about the risks of opening these suspicious mails You can prevent a cyberattack warns Molina.

10 – Darknets or deep web, trade vulnerabilities:

Felix Molina predicts a growth in sales of “exploits” or guide vulnerabilities, whereby inexperienced persons may carry out cyber attacks.

Back to top button
Close