Difference between revisions of "Malware"
Bob Zenith (talk | contribs) m |
Bob Zenith (talk | contribs) m |
||
Line 1: | Line 1: | ||
− | Malware is a category of malicious code that includes [[Computer Virus|viruses]], worms, spyware / adware programs, keyloggers, and [[Trojan Horse|Trojan Horses]]. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [http://www.symantec.com/norton/security_response/malware.jsp] | + | Malware is a category of malicious code that includes [[Computer Virus|viruses]], worms, [[Spyware|spyware]] / [[Adware|adware]] programs, keyloggers, and [[Trojan Horse|Trojan Horses]]. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [http://www.symantec.com/norton/security_response/malware.jsp] |
Revision as of 21:03, 9 April 2010
Malware is a category of malicious code that includes viruses, worms, spyware / adware programs, keyloggers, and Trojan Horses. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [1]
Protecting Yourself from Malware
- Only open emails, IMs, and attachments from trusted sources and/or when they are expected
- If possible, have emails and attachments scanned by an anti-virus or anti-malware software
- Delete all unwanted messages without opening them
- Do not click on any suspicious web links, or links from an unknown/suspicious sender
- Only transfer files from a trusted, secure source
- Keep security patches up-to-date; always update your software