Part 2 – 1: : Terms and Definitions for Malware
Term | Definition |
Malware | Software that will do harm to your computer |
Anti-Virus | Software the protects your computer from threats |
Malware covers many types of malicious software looking to wreck havoc on your computer. Malware can be considered a form of keystroke logging which the attacker can see or record what is being pressed on your keyboard, or it can be virus which could take over your computer and start deleting files, overflowing your desktop with ads, and even providing backdoors to your computer to allow the attacker access when needed.
Just like many other types of viruses and attacks, they can be mitigated or prevented by using a firewall or anti-virus/anti-malware software. You may think that the operating system provided firewall or defender on your computer is good enough, but Microsoft or Apple usually do not offer the firewall definitions fast enough compared to third party anti-virus companies like Malwarebytes, MacAfee, or Trend Micro. This is due to how patching works within Microsoft and Apple. When the operating system firewall or defender needs to be updated, the updates usually need to go through testing of the entire OS to make sure something does not break. Third party companies only have to worry about a single application of their own from breaking which makes it a lot easier and faster to patch new threats that are picked up around the world.
A great tool to look at that is available for free on the internet is the Kaspersky cyberthreat map. You can find the map here cybermap.kaspersky.com which goes further into detail on other attacks being used around the world. The map shows real time attacks covering viruses to ransomware but Kaspersky also provides statistics on the types of attacks being used down the the files being found.
So how do these attacks happen? Just like any other types of attacks, malware can be caused by clicking on links that bring you to infected websites or a link that starts a download of software. Other ways malware is initiated is through third party software that includes infected files such as if you want to install additional software that is being advertised in the software you are intending to install.