Notes mobile computing
Notes mobile computing
Types of malware can include computer viruses, worms, Trojan horses and
spyware. These malicious programs can perform a variety of different
functions such as stealing, encrypting or deleting sensitive data, altering or
hijacking core computing functions and monitoring users' computer activity
without their permission.
History
The term malware was first used by computer scientist and security
researcher Yisrael Radai in 1990. However, malware existed long before this.
One of the first known examples of malware was the Creeper virus in 1971,
which was created as an experiment by BBN Technologies engineer Robert
Thomas. Creeper was designed to infect mainframes on ARPANET. While the
program did not alter functions, or steal or delete data, the program moved
from one mainframe to another without permission while displaying a teletype
message that read, "I'm the creeper: Catch me if you can." Creeper was later
altered by computer scientist Ray Tomlinson, who added the ability to self-
replicate to the virus and created the first known computer worm. The concept
of malware took root in the technology industry, and examples of viruses and
worms began to appear on Apple and IBM personal computers in the early
1980s before becoming popularized following the introduction of the World
Wide Web and the commercial internet in the 1990s.
How malware works
Phishing attacks are another common type of malware delivery where emails
disguised as legitimate messages contain malicious links or attachments that
can deliver the malware executable to unsuspecting users. Sophisticated
malware attacks often feature the use of a command-and-control server that
allows threat actors to communicate with the infected systems, exfiltrate
sensitive data and even remotely control the compromised device or server.
A virus is the most common type of malware which can execute itself and
spread by infecting other programs or files.
Spyware is made to collect information and data on the device user and
observe their activity without their knowledge.
Ransomware is designed to infect a user's system and encrypt the data.
Cybercriminals then demand a ransom payment from the victim in
exchange for decrypting the system's data.
Adware is used to track a user’s browser and download history with the
intent to display pop-up or banner advertisements that lure the user into
making a purchase. For example, an advertiser might use cookies to track
the web pages a user visits to better target advertising.
Keyloggers, also called system monitors, are used to see nearly everything
a user does on their computer. This includes emails, opened web-pages,
programs and keystrokes.
Mobile malware
Malware can also be found on mobile phones and can provide access to the
device's components such as the camera, microphone, GPS or
accelerometer. Malware can be contracted on a mobile device if the user
downloads an unofficial application or if they click on a malicious link from an
email or text message. A mobile device can also be infected through a
Bluetooth or Wi-Fi connection.
Malware is found much more commonly on devices that run the Android OS
comparatively to iOS devices. Malware on Android devices is usually
downloaded through applications. Signs that an Android device is infected
with malware include unusual increases in data usage, a quickly dissipating
battery charge or calls, texts and emails being sent to the device contacts
without the user's knowledge. Similarly, if a user receives a message from a
recognized contact that seems suspicious, it may be from a type of a mobile
malware that spreads between devices.
Apple iOS devices are rarely infected with malware because Apple carefully
vets the applications sold in the App Store. However, it is still possible for an
iOS device to be infected by opening an unknown link found in an email or
text message. iOS devices will become more vulnerable if jailbroken.
A user may be able to detect malware if they observe unusual activity such as
a sudden loss of disc space, unusually slow speeds, repeated crashes or
freezes or an increase in unwanted internet activity and popup
advertisements. An antivirus tool may also be installed on the device that
detects and removes malware.These tools can either provide real-time
protection or detect and remove malware be executing routine system scans.
Malware bytes is another anti-malware tool which can remove malware from
Windows, macOS, Android and iOS platforms. Malwarebytes can scan
through a user’s registry files, running programs, hard drives and individual
files. If detected, malware can then be quarantined and deleted. However,
users cannot set automatic scanning schedules.
Virus(Vital Information
Resources Under Seize)
VIRUS
• Computer Virus is a kind of malicious software
written intentionally to enter a computer
without the user’s permission or knowledge,
with an ability to replicate itself, thus
continuing to spread. Some viruses do little
but replicate others can cause severe harm or
adversely effect program and performance of
the system.
Types of VIRUS and Related Threats
Resident Viruses
This type of virus is a permanent which lives in the
RAM memory. From there it can overcome and
interrupt all of the operations executed by the
system like:
corrupting files and programs
that are opened, closed, copied,
renamed etc.
Examples include: Randex, CMJ, Meve, and
MrKlunky.
Boot Virus
This type of virus affects the boot sector of a floppy or
hard disk. This is a crucial part of a disk, in which
information on the disk itself is stored together with a
program that makes it possible to boot (start) the
computer from the disk.
The best way of avoiding boot viruses is to ensure that
floppy disks are write-protected and never start your
computer with an unknown floppy disk in the disk drive.
Spyware can be difficult to detect; often, the first indication a user has that a
computing device has been infected with spyware is a noticeable reduction in
processor or network connection speeds and in the case of mobile devices --
data usage and battery life. Anti-spyware tools can be used to prevent or
remove spyware. Anti-spyware tools can either provide real-time protection by
scanning network data and blocking malicious data, or detect and remove
spyware already on a system by executing scans.
Spyware is not just one type of program. It's an entire category of malicious
software that includes adware, Trojans, keystroke loggers, and information
stealing programs.
Cookies that track and record users' personal information and internet
browsing habits are one of the most common types of adware. An advertiser
might use cookies to track what web pages a user visits in order to target
advertising in a contextual marketing campaign. For example, an advertiser
could track a user’s browser history and downloads with the intent to display
pop-up or banner advertisements to lure the user to make a
purchase. Because data collected by spyware is often sold to third parties,
regulations such as GDPR (General Data Protection Regulation) have been
enacted to protect the personally identifiable information (PII) of website
visitors.
Keyboard loggers - Keyloggers are a type of system monitor that are often
used by cybercriminals to steal personally identifiable information (PII), login
credentials and sensitive enterprise data. Keyloggers may also be used by
employers to observe employees' computer activities, parents to supervise
their children's internet usage, users to track possible unauthorized activity on
their devices or law enforcement agencies to analyze incidents involving
computer use.
Trojans - Trojans are typically malicious software programs that are disguised
as legitimate programs. A victim of a Trojan could unknowingly install a file
posing as an official program, allowing the Trojan to have access to the
computer. The Trojan can then delete files, encrypt files for ransom or allow
others to have access to the user’s information.
Anti-spyware tools
Trend Micro House Call is another anti-spyware tool which doesn’t require
user installation. Because it doesn’t require an installation, HouseCall uses
minimal processor and memory resources, as well as disk space. Users
cannot set automatic scans, however.