The world has changed – and that change is only set to continue. Whether at home or in our professional lives, we are more connected than ever before and have multiple devices that we use daily, from smartphones and tablets to PCs and more.
The drawback to this convenience is that each of us is now responsible for making sure these multiple devices are not vulnerable to malware. Malware (malicious software) can cause havoc both in our personal lives and for businesses of all sizes. Devices can become inaccessible, data can be lost, financial records and banking access can be hijacked, and companies can find themselves paralysed.
In this blog post, we take a look at the different types of malware and what you can do to help stay safe and protect yourself.
What actually is malware?
Malware is the catch-all term for malicious software – it encompasses many different types of software, but here are the most common types:
Viruses: a virus is malicious software that attaches itself to a file or program. When you run the infected program, the virus activates and starts replicating and spreading.
Worm: a worm is similar to a virus, in that it will replicate and spread, but doesn’t not need any human interaction. There is no program that needs to run to execute a worm, it can consume your computer’s resources and use those to help it spread too.
Trojan: named after the Ancient Greek Trojan Horse, this type of malware is disguised as something else. When a trojan has tricked someone into downloading and running it, it will execute the malicious actions that have been coded into it
Ransomware: one of the most common forms of malware. Once on a device, ransomware encrypts all the data it can find and holds it for ransom (paid using cryptocurrency). As with any ransom, there is typically a deadline, at which point criminals threaten to delete or publicly publish any valuable data.
Spyware: this is a type of malware that wants to monitor what is happening on a computer. Unlike our other examples, there is no goal to damage the machine; instead, spyware quietly observes while users may log into sensitive systems and gathers credentials, credit card numbers, and other important information.
What can you do to stay safe?
Why are these products important?
What you need to know about ransomware
The consequences of a ransomware attack can be utterly devastating. The mere thought of a business losing access to its computers, its networks and its data is a nightmare scenario for many – and this fear became a harsh reality for the UK logistics firm KNP Logistics...
Can you spot a phish?
Roughly 8.3 billion emails are sent each day in the UK and nearly half of them are spam or phishing emails. That’s a whole lot of rogue and potentially malicious emails – and a pretty frightening number too! We all know that spam is generally unwanted or irrelevant...
What is CHECK? Exploring qualifications and pathways.
Like many industries, cyber security is full of acronyms and abbreviations – and this also extends into qualifications. We talk to and work with a lot of people who are either trying to break into a career in penetration testing, or who work at a consultancy that...
How secure is your password really?
For years we’ve been told that the best approach to staying secure is to have a good password. Conventional wisdom says that this should be at least nine characters long and use a combination of upper and lower case characters, numbers, and special characters. But I...