Malware is a form of
malicious software created by cybercriminals to carry out unauthorized access
to computer systems. Malware is designed by operators to wreck havoc in the
computing world. It is a software designed to steal sensitive and valuable data
or information from individuals or organizations, to cause damage to a system,
to make working difficult for both private individuals and organizational
systems’ operators. Malware attacks on computers pose a serious threat to the reputations of both
private individuals and organizations. Malware software can
threaten or even destroy one’s ability of getting work done. When introduced,
it can infect devices and networks. With malware, identify theft can be easily
perpetrated, recourses can be stolen, systems can be damaged, and data can be
breached.
There are different
types of malware. They include: Worms, Spyware, Keyloggers, Ransomware, Adware,
Botnets, Viruses, etc.
Worm: This type exploits
the weakness in a computer security system and duplicates itself from one
machine to the other.
Spyware: As the name implies,
it is a type of malicious software that acts as a spy. It spies on a user’s
device and gathers information about passwords, usernames, visited sites,
emails etc, and sends them to the malware operators.
Keyloggers: This type
of malware steals credit card numbers, passwords and other sensitive data by
keeping record of a user’s keystrokes, emails, webpages being accessed, etc.
Ransomware: This has
the ability to encrypt the files of a system to hinder user’s access to the
device and its data, giving the cybercriminal the leverage to make absurd demands for ransom.
Adware: Adware takes
record of a user’s browser history and then display unwanted advert pop-ups.
Botnets: This causes
damage to a computer by allowing attackers send commands to a malware remotely.
Viruses: Viruses has
the ability to overwrite the codes of a computer program and cause it to import
malicious code that would end up infecting the system.
Malware attacks can take place through infected websites, software from third-party websites, removable drives (USB or external hard drive), phishing attacks etc. Signs of malware attacks to look out for in a system include:
o
Unexpected add pop-us,
o
Unusual network activity,
o
Slow system performance,
o
Crash of system programs
o
Unauthorized changes of system settings,
o
Inaccessibility of files.
There are many other ways cybercriminals gain access to a computer system without the victim’s knowledge; there are also ways to prevent the occurrence of this cyber menace. Some of the ways to prevent falling prey to malicious software are:
·
Avoiding dubious websites
·
Making use of strong passwords
·
Making use of antimalware software
·
Avoiding pop-ups
·
Using a firewall
·
Exercising caution with mail
The intention of every
malware operator is to take undue advantage of a system’s vulnerability to
steal data, cause failure in systems, and leverage on victims’ finances by way
of exploitation. The installation of malware in a device can even lead to the
damage of one’s reputation, as your personal information can be accessed and be
tampered with. With the daily rise of cyber criminality, it is therefore obligatory
to guard against the implanting of malware in systems by taking preventive
actions against such ugly circumstances. This can be by way of isolating
infected systems, applying regular patches, securing networks from intrusion
etc.
By: Joy Ebi-Robert