Below is a list of the different variants you need to be aware of:
Written in macro language such as VBS (Visual Basic Scripting). Macro Viruses are usually platform independent since many apps allow macro programs to be embedded in documents. Programs may run automatically once a document is opened (word, excel), then the VBS scripts will begin to make their way into your system.
A computer virus whichy stealthily hides its modifications. It tries to trick antivirus software by intercepting its request to the OS and provide false information.
This type of virus produces a variety of altered operational copies of itself. It is possible for there to be no identical parts between two different infected copies. This makes it very difficult to detect directly using signatures and anti-virus software.
Attempts to hide antivirus software by modifying its code to not match pre-defined antivirus signatures.
Collection of hacked devices under commanded control of a hacker. Compromised machines may be part of a bot network or a zombie.
A virus that spreads from one machine to another on a network.
The worst software based malware. Usually embedded into the kernel of the ODS therefore can conceal itself completely from the OS.
The Worst of the worst. Within your hard drives firmware chip, you may have some malware. Formatting your drive and re-installing the OS will not shift it. This type of malware is NSA, GCHQ standard. However, podcasts and papers have been produced on how to counter it. IT Specialists of note may have taken the time to learn how to remove it.
Logs your key strokes and what you type into your browser.
Appear to be one thing but are in fact malware. If you download a piece of software, a trojan acts as the software but has malware attached.
Malicious programs that run on your system allowing intruders to access your systems remotely. Similar to remote admin tools but hackers are using them. These can be bought and also downloaded.
Cyber criminals often combine different types of malware to launch a multi-faceted attack on your systems. The ability to recognise various attack methods is as important as the technology you choose to protect your business infrastructure. Here's some strategies a hacker might use against you which are worthy of knowing.
I’m sure you know yourself. You know your business. Of course you want to protect everything in it,
Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi
You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l
What business owners consider to be valuable assets will vary from one business owner to another bu