Understanding Viruses, Worms, Trojans and Other Computer Threats

adsense 336x280

While everybody is nowadays aware that harmful programs and other kind of threats are common menaces our computers need to be defended from, the majority of PC and internet users still not have a clear idea of what viruses, worms and trojan horses exactly are. This article is just an attempt to give some basic definitions to help common people better identify the various kinds of computer threats.
A computer virus basically is a program that copies itself and infects other computers. It usually hides into executable files (the infected files, called hosts) to be stealthily spread from a computer to another. A true virus, to infect other computers, needs to be physically copied from the infected one, that is, it needs to be carried on an external mean (CD, DVD, USB memories, ...) or somebody has to spread it over a network or the internet. A true virus doesn't activate itself automatically, as it needs the user to perform a precise task or hit a key or a set of keys to take action. Most viruses carry a payload, i.e. a set of instructions to execute when the virus is activated. Depending on the payload, some viruses can be innocuous while others very harmful.
Worms are basically like viruses in terms that they attempt to spread from computer to computer, but unlike a virus, a worm doesn't need to be hosted into an infected file to reach its victim, as it is a fully executable file that uses its own means to spread and infect. Worms scan the internet in search of vulnerable computers, so they spread very fast.
Trojan Horses are harmful programs that look innocuous. They use to arrive as an e-mail attachment, while the e-mail text focuses on inviting the victim to open it. They usually contain harmful code that deletes files or corrupts directories.
With the term Phishing we mean all those criminal (sometime ingenious) techniques to attempt acquire sensitive information from a victim, such as user names, passwords, bank account and credit card details, by mean of fake but trustworthy looking websites. Usually a fake email is sent to the victim inviting him/her update his/her personal data for an official entity, but instead of the official web page a fake one is given.
Hostile websites use to be innocuous looking websites that hide malicious code to be executed as a script/activeX in the victim's web browser. They attempt to exploit security issues of the browser to install viruses and spyware in the computer.
Finally, it is worth to mention all those scams the internet is full of; some are restyled old scams while others are shining new. The ""work at home and be rich doing practically nothing"" is among the most famous ones: often it is just a little scam that steals the victim some money, but sometimes it may be a very dangerous game including hidden criminal activities such as money laundering.
adsense 336x280

0 Response to "Understanding Viruses, Worms, Trojans and Other Computer Threats"

Post a Comment