CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Blog

15 Malware Related Definitions

Reading Time: 6 mins read
in Blog, Malware

 

1 – Malware

Short for “malicious software”. It is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

 

 

 

2 – Malware Sandbox

A malware sandbox, within the computer security context, is a system that confines the actions of an application, such as opening a Word document, to an isolated environment. Within this safe environment the sandbox analyzes the dynamic behavior of an object and its various application interactions in a pseudo-user environment and uncovers any malicious intent.

 

 

3 – Screen Lockers

Screen lockers shut off access to your computer by taking over the operating system. They deny access to the data but don’t encrypt it.

 

 

 

4 – Scareware

Is malicious software that tricks computer users into visiting malware-infested websites. Also known as deception software, rogue scanner software or fraudware, scareware may come in the form of pop-ups.

 

 

 

5 – Deeplocker

Is an AI-powered malware. DeepLocker was developed as a proof of concept by IBM Research in order to understand how several AI and malware techniques already being seen in the wild could be combined to create a highly evasive new breed of malware, which conceals its malicious intent until it reached a specific victim.

 

 

6 – Botnet

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry.

 

7 – Backdoor

Backdoor it’s a program or bit of code designed to allow a computer to be remotely accessed (typically for diagnostic, configuration, or technical support purposes).

 

 

 

8 – Logic Bombs

A logic bomb is a type of malicious software that is appended to an application and is triggered by a specific occurrence, such as a logical condition or a specific date and time.

 

 

 

9 – Trojans

A Trojan or a Trojan horse is a program that hides in a useful program and usually has a malicious function. A major difference between viruses and Trojans is that Trojans do not self-replicate. In Addition to launching attacks on a system, a Trojan can establish a back door that can be exploited by attackers.

 

 

10 – Droppers

A dropper is a kind of Trojan that has been designed to “install” some sort of malware (virus, backdoor, etc.) to a target system. The malware code can be contained within the dropper (single stage) in such a way as to avoid detection by virus scanners or the dropper may download the malware to the target machine once activated (two stage).

 

11 – Adware

Adware is an unwanted software application designed to throw advertisements up on your screen, most often within a web browser. Advertising banners are displayed while any program is running. It can be automatically downloaded to your system while browsing any website and can be viewed through pop-up windows or through a bar that appears on the computer screen automatically.

 

12 – Spyware

Spyware is a type of program that is installed to collect information about users, their computers or their browsing habits. It tracks everything you do without your knowledge and sends the data to a remote user.

 

 

13 – Worms

Worms differ from viruses in that they do not attach to a host file but are self-contained programs that propagate across networks and computers. Worms are commonly spread through email attachments; opening the attachment activates the worm program.

 

 

 

14 – Stealth Viruses

A stealth virus uses various mechanisms to avoid detection by antivirus software. Generally, stealth describes any approach to doing something while avoiding notice. These viruses conceal any increase in the size of an infected file or changes to the file’s date and time of last modification.

 

 

15 – Keylogger

Keyloggers, also referred to as system monitors, are applications designed to capture computer activity, including keystrokes, websites visited, search history, email discussions, chatroom dialogue, and system credentials. They typically collect screenshots of the current window at scheduled intervals.

 

 

 

 

Tags: AdwareBackdoorBotnetCyber Professionals DefinitionsDeepLockerDefinitionsDroppersKeyloggerLogic BombsMalwareMalware Sandboxmalware-definitionsScarewareScreen lockersspywareStealth virusesTrojansWorms
ADVERTISEMENT

Related Posts

How can investors protect themselves against cyber attacks?

How can investors protect themselves against cyber attacks?

February 1, 2023
How to protect your online privacy?

How to protect your online privacy?

January 18, 2023
How to protect your health data?

How to protect your health data?

January 18, 2023
How to secure your smart devices?

How to secure your smart devices?

December 29, 2022

More Articles

Alerts

Drinik Android malware now targets users of 18 Indian banks

October 28, 2022
Alerts

Cisco Releases Security Updates for Multiple Products

September 23, 2021
Tool

Ondat – Software

June 16, 2022
Book

Single sign-on: Beginner’s Guide

March 7, 2022

FAST FLUX

February 11, 2021
CyberStory

CyberStory: The Hackers that Uploaded their Fingerprints To the Crime Scene

October 14, 2020
Blog

5 cybersecurity podcasts for travelers

September 23, 2022

ADVERSARY INFRASTRUCTURE REPORT 2020: A DEFENDER’S VIEW

January 15, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.