monitors every keystroke a computer user makes as well as system events.
Which means thieves can steal your password, email addresses, IM (instant
messenger) usernames, banking information and other sensitive details.
the most sinister of all types of malware, going to the operating system
and disabling security features such as firewalls and anti-virus programs,
this rendering themselves invisible. They also install other malicious
code, change your setting and system configurations, access private files,
and generally affect security and system performance.
– pretend to be innocuous plugins, add-ons, or even Encoder/Decoder for
multimedia audio or video player such as WinAmp, and other harmless
software. Often sent through an email or web page written to trick you
into installing the Trojan. Typically found on music or video downloads.
self-propagating (they multiply on their own) form of malware. Worms hunt
for security flaws in other computers on the same network as an infected
computer and copy themselves onto the new computer through that loophole.
This can result in huge network traffic floods or outages, as well as mass
infection over a short period of time.
Page / Next Page