VIRUS

HOW DOES VIRUSES(MALWARE,TROJAN,SPYWARE) WORK?

WHAT IS VIRUS?

A computer virus is a malicious piece of computer code designed to spread from device to device. Computer viruses generally require a host program The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A computer worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks

virus

Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally, and often requires something powerful to get rid of it. A computer virus is very similar. Designed to replicate relentlessly, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether.

MALWARES

Malware is short for malicious software. Malware is the name that is given to any type of software that could harm a computer system, interfere with and gather a user’s data, or make the computer perform actions without the owner’s knowledge or permission.

How does malware work?

Malware typically infects a machine by tricking users into clicking and/or installing a program that they shouldn’t from the Internet. When the click or installation occurs, the malicious code executes actions that the user doesn’t anticipate or intend, which could include:

  • Self-replication in different parts of the file system.
  • Installing applications that capture keystrokes or commandeer system resources, often running without the user being aware, while slowing the system down considerably.
  • Blocking access to files, programs or even the system itself, sometimes forcing the user to make a payment to regain access.
  • Bombarding a browser or desktop with ads.
  • Breaking essential system components and rendering a device inoperable.

Malware can also be disguised as a program or app that claims to convert PDFs, unzip files, find product discounts or provide caller ID functionality on a smartphone.

TROJAN HORSE

A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. It is one of the malicious computer virus.

HOW DOES TROJAN WORKS?

Trojan viruses work by taking advantage of a lack of security knowledge by the user and security measures on a computer, such as an antivirus and antimalware software program. A Trojan typically appears as a piece of malware attached to an email. The file, program, or application appears to come from a trusted source. As the user views the email attachment, the trusted source it comes from has the potential to be a ruse. The goal is to get the user to download and open the file.

Once this happens, malware or other malicious content is installed and activated on the computer or other devices. One common form of attack is to have malicious content spread to other files on the device and damage the computer. How it goes about doing this varies from one Trojan to the next. It is all in the design and intent of the hackers that built the Trojan malware.

SPYWARE

Spyware is software that aids in gathering information about a person or organization without their knowledge. Spyware can monitor and log the activity that is performed on a target system, like log key strokes, or gather credit card and other information.

HOW DOES SPYWARE?

This malware may be in or alongside legitimate programs and websites via vulnerability exploits, or in custom-designed fraudulent apps and sites.

Bundleware, or bundled software packages, are a common delivery method for spyware. In this case, the software attaches itself to some other program you intentionally download and install.

Alternatively, spyware can get into a computer through all the avenues that other malware takes, such as when the user visits a compromised website or opens a malicious attachment in an email.

SUMMARY

To encapsulate virus are something malicious programs which attack our system and do threat to our confidential data and information.We should be aware about different forms of viruses. While both are types of malware that hide within your device, viruses are designed to replicate and embed into our other device files.

About the author

Arunshi Srivastava

View all posts
5 1 vote
Article Rating
Subscribe
Notify of
guest
1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Khushi
Khushi
2 years ago

Amazing content 👏💯