Malware

The term encompasses many categories, read to find out more about some different types and common tactics.

microbe_1f9a0

Virus

Attached to a file, spreading from host to host, viruses disrupt operations and cause data loss.

worm_1fab1

Worm

Very similar to viruses but worms do not need host programs to spread and can spread rapidly.

trident-emblem_1f531

Trojan

Disguised as useful software and then gains access to sensitive information. These viruses are not designed to self-replicate.

detective_1f575-fe0f

Spy

Spyware runs discretely on your system and reports data back to the attackers.

money-bag_1f4b0

Ransom

Ransomware gains access to sensitive information then will lock data and demand a payout in for its return.

warning_26a0-fe0f

Rootkit

Rootkits are used to gain full control your machine, then steal data, deactivate antivirus, and crash your system.

Scary?
fearful-face_1f628

If you’ve ever fallen victim to malware, you’re not alone. It can be scary, but we have some ways to keep stay you safe:

  • Email
    1. Be cautious about clicking on links and stay alert to the ones you choose to open.
    2. Stay alert when using email, go through messages carefully and check the sender.
  • Software
    1. Employ a trusted antivirus software. We recommend Malwarebytes
    2. Use complex passwords with a manager. We recommend LastPass
  • Security
    1. Enable Two-Factor Authentication (2FA) whenever possible. This combines your password with codes through apps or, less securely, delivered via email or SMS.
    2. Don’t trust websites that lack SSL. You can spot secure ones by the “Secure” label or a lock icon in the address bar.