Finance and Technology
Jun 2023 | By Greg Gazin
While you may not think so, your data is extremely valuable. This is true whether it’s something as simple as your name, address and phone number (which can easily be found in a directory), to your crucial financial and banking information. So much so, that felons from around the globe spend day and night trying to steal it from you. And while they can’t each into your pocket or purse, they can use various types of Malware to extract your information – sell it, corrupt it or hold it hostage.
What is Malware?
Malware is one of those hybrid terms – a combination of the words malicious and software. It is a general reference for any type of action, or activity, that is designed to exploit, or infiltrate, a computer or mobile device.
In a previous column we looked at Email Phishing, which is not actually Malware, but a means to an end. Phishing is used to get unsuspecting individuals to visit a website infected with Malware, or click on a link that may install Malware on your device.
Malware can take many forms, including commonly known Viruses, Worms, Spyware, Ransomware and Trojans. Some of these even work in conjunction with each other.
Viruses are Very Contagious
Computer viruses have been around for more than half a century. Typically, they’re a piece of malicious code that inserts itself into a piece of software. NortonLifeLock, formerly Symantec and the makers of Norton Anti-Virus, insists that viruses can also alter the way a computer operates, plus they are designed to spread from one computer to another.
A virus is executed when the program is run, or at a specified time. The infection can be triggered by clicking on a link, downloading movies and files from questionable websites, or as an email attachment, where it can be hidden within a PDF or Word document.
Not only can it open a door to stealing or corrupting your data, it can also cause crashes and malfunctions on the systems that it infects.
Holding You Hostage
Equally nasty are Worms. These are pieces of executable code that spread like a virus and cause unknown effects. But, unlike a virus, it doesn’t need a host to replicate itself. As the name implies, it replicates by slithering its way from place to place – not just on your computer but across networks as well.
Spyware allows your computer or mobile device to act as a spy, and captures your every move. For example, keystroke loggers capture everything that is being inputted. These are not malicious per se, and parents can legitimately install these to monitor their kids’ activities. Cybercriminals install these in hopes of catching private information, like account numbers and passwords – making even the most complex password useless. Spyware can also breach a user’s privacy by activating their webcam and microphone.
Ransomware holds your computer for ransom. Attackers may encrypt the contents of your computer and convert everything to an unreadable format that can only be decrypted or decoded with a password, unless you send them payment – often in the form of cryptocurrency. This is why it’s important to have backed up before an incident occurs.
A Ransomware attack may also threaten to publish confidential files, including documents that contain sensitive information, or by compromising photos, audio or videos that are stored on your computer or captured or from your webcam.
A Trojan pretends to be something it’s not. It earned its moniker from the Trojan Horse used by the Greeks to win the Trojan war. Anti-Virus maker ‘Avast’ compare it to letting your guard down and opening your doors – leaving you vulnerable to attacks.
Trojans can appear to be legitimate. But it could be a piece of anti-virus software, which is the opposite. Unbeknownst to you, it could be a fake pop-up masquerading as a software update to the latest version of Acrobat, while downloading a PDF. You click as you’ve done in the past, and all of a sudden, your computer is infected with a virus or worm. It might even open a permanent backdoor, and bypass any security, allowing unlimited unrestricted access to your devices, as well as your connected devices like your home security and thermostat. Cybercriminals are constantly trying to stay one step ahead.
Advice for Protecting Yourself
There isn’t a foolproof way to ward off all attacks, but you can be diligent in taking precautions.
Use strong passwords and change them often.