Malware 101: Understanding the Secret Digital War of the Internet
By Paul Gil, Internet Basics Expert
Updated February 14, 2016.
What Is Spyware/Malware?
Forget viruses, spam and hacker attacks...malware is the real daily problem that you will face as a web user. These nasty little rogue programs have become so widespread and so infectious, their volume far outstrips spam and regular viruses. The malware problem has grown to such an immense breadth and depth, it is actually a major revenue source for organized crime syndicates.
Continue Reading Below
Most people historically call these rogue programs "spyware". That name comes from the 1990's where nasty little programs secretly observed and logged your web surfing habits. The spyware problem, however, has now grown into dozens of other malicious formats, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms
Because the spyware problem has mutated so much, we now describe spyware as part of a much larger category of rogue software called "malware" (malicious software programs)
At its most basic definition, malware is when insidious little software programs covertly install themselves on your computer, and then perform secret operations without your permission.
See Also: The Best Music Streaming / Radio Stations of 2016
Once in place, malware programs may do hundreds of nasty things to your computer. Malware will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive.
Continue Reading Below
Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.
What Does Malware Actually Do to My Computer?
Malware will perform a variety of nasty activities, ranging from simple email advertising all the way to complex identity-theft and password-stealing. New nasty functions are created every week by malware programmers, but the most common malware functions are:
- Malware steals your personal information and address book (identity theft and keystroke-logging).
- Malware floods your browser with pop-up advertising.
- Malware spams your inbox with advertising email.
- Malware slows down your connection.
- Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
- Malware uses your computer as a secret server to broadcast pornography files.
- Malware slows down or crashes your computer.
Where Does Malware Come from?
Malware programs are authored by clever programmers, and then delivered to your computer through covert Internet installs. Usually, malware will piggyback on innocent-looking web page components and otherwise-benign software such as game demos, MP3 players, search toolbars, software, free subscriptions, and other things you download from the web. Subscribing to online services is especially bad for getting malware. In particular, whenever you sign up for a so-called "free" service or install new software, you must accept an "end user license agreement" (EULA). The fine print of the EULA will often include the phrase "the vendor is allowed to install third-party software on your computer". Since most users don't bother to read this EULA fine print, they naively click "accept", and install malware out of sheer ignorance.
What Kind of Personal Information Does Malware Steal?
This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.
Next: How to Detect and Destroy Spyware/Malware on Your Computer.
^ed
No comments:
Post a Comment