Difference between revisions of "Malware"

From WOT Wiki
Jump to: navigation, search
m
(Popular Malware Removal Tools)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
Malware is a category of malicious code that includes [[Computer Virus|viruses]], worms, spyware / adware programs, keyloggers, and [[Trojan Horse|Trojan Horses]]. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [http://www.symantec.com/norton/security_response/malware.jsp]
+
Malware is a category of malicious code that includes [[Computer Virus|viruses]], [[Computer Worm|worms]], [[Spyware]]/[[Adware]] programs, [[Keylogger|keyloggers]], and [[Trojan Horse|Trojans]]. Destructive malware will utilize communication tools to spread, including worms sent via email and IMs, Trojan horses inside web sites, and viruses files downloaded from P2P connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [http://www.symantec.com/norton/security_response/malware.jsp]
 
+
  
 
== Protecting Yourself from Malware ==
 
== Protecting Yourself from Malware ==
Line 10: Line 10:
 
* Only transfer files from a trusted, secure source
 
* Only transfer files from a trusted, secure source
 
* Keep security patches up-to-date; always update your software
 
* Keep security patches up-to-date; always update your software
 +
 +
 +
== Popular Malware Removal Tools ==
 +
 +
* Emsisoft Antimalware - [https://www.emsisoft.com/en/software/antimalware/ visit]
 +
* Malwarebytes Anti-Malware - [https://malwarebytes.org/ visit]
 +
* Microsoft Security Essentials - [http://www.microsoft.com/business/en-sg/Solutions/Pages/Security.aspx visit]

Latest revision as of 03:32, 16 July 2012

Malware is a category of malicious code that includes viruses, worms, Spyware/Adware programs, keyloggers, and Trojans. Destructive malware will utilize communication tools to spread, including worms sent via email and IMs, Trojan horses inside web sites, and viruses files downloaded from P2P connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [1]


Protecting Yourself from Malware

  • Only open emails, IMs, and attachments from trusted sources and/or when they are expected
  • If possible, have emails and attachments scanned by an anti-virus or anti-malware software
  • Delete all unwanted messages without opening them
  • Do not click on any suspicious web links, or links from an unknown/suspicious sender
  • Only transfer files from a trusted, secure source
  • Keep security patches up-to-date; always update your software


Popular Malware Removal Tools

  • Emsisoft Antimalware - visit
  • Malwarebytes Anti-Malware - visit
  • Microsoft Security Essentials - visit