Tag Archives: Ransomware

Antivirus Glossary

Adware

Adware is a type of malware which displays unwanted advertisements and tracks browsing behaviour while the program is running. These unwanted applications can disguise itself as a legitimate program to trick into installing harmful programs on your system and can collect personal information without the user’s permission.

Brute Force Attack

A brute force attack is an attempt to crack a password or keys by making repetitive attempts. This is performed on a trial and error method to fetch the required information.

Cryptojacking

The fraudulent practice by someone to mine the cryptocurrencies is Cryptojacking. Here, hackers steal computing resources from the victim’s device and operate complex crypto mining operations without any overhead investment.

DDoS

A distributed denial-of-service (DDoS) attack is a malicious attempt in which multiple compromised computer systems attack a target to disrupt normal traffic of a targeted server, service or network with a flood of Internet traffic.

Keyloggers

A type of surveillance software that tracks everything a user types, including usernames and passwords. Keyloggers are often part of malware or spyware.

Logic Bomb

A Logic Bomb is a string of malicious code used to cause harm to a network when the programmed conditions are met. It is timed to cause harm at a certain point in time but is inactive up until that point. Once activated, a logic bomb implements a malicious code that causes harm to a computer

Malware

Malware is a written code with the intention to disrupt or manipulate systems and devices. Malware can be delivered in different forms and types depending on the nature and intention of the attacker. The common types of malware are viruses, ransomware, spyware, worms and Trojan horses.

Pharming

Pharming refers to manipulate website traffic through hacking which redirects a search to a fake website. Here, hackers create an impostor site, which may look exactly like the real site and prompt users to land on this illegitimate website to steal confidential information,

Phishing

A phishing attack is an attempt to let the victim share the personal or financial details with the attacker. It is basically done via emails, text messages, voice calls and malicious links within websites, emails or ads.

Ransomware

Ransomware is a type of malware which blocks or restricts the user from accessing their files/folders on a computer or in some cases it blocks the user access to the whole network. Paying ransom to the attackers becomes the only way to get access back.

Rootkit

A rootkit is a malicious program which is used to gain administrator-level access to a targeted system. It is installed by exploiting the system vulnerabilities without the consent of the user.

Remote Access Trojan (RAT)

A remote access Trojan (RAT) is basically a dangerous malware program which usually takes a back door channel to get into your system and takes all the administrative control over it. This also leads to the compromising of your system along with the files, folders and other important documents.

Spear Phishing

Spear-phishing attack is an attempt to get the required information from the specifically targeted victim. Here, the attack is limited to an individual or a very small group of related people to steal confidential information.

Spyware

Spyware is malicious malware which infects the system, Smartphone or any other device and gathers information. Spyware enters the system without the knowledge of the user as a legitimate program and runs quietly while collecting and tracking information.

Trojan

A trojan is a computer program which appears harmless and misrepresents as a useful program but in reality, it is malicious in nature. Trojans can create a backdoor entry into the system which can give control of your computer to the hacker to carry out malicious actions.

Virus

A computer virus is a malicious program that spread throughout the system by copying itself to another program. It self replicate itself and make changes in the boot sector, programs, applications, files and can also damage the system.

Worm

A worm is a type of malicious software program that replicates while moving across computers and leaving copies of itself in the memory of each computer in its path while remaining active on infected systems.

Zero-day

Zero-day is a flaw in software that is yet unknown to the software vendor. Although this vulnerability is known to the code attackers, who use it to take advantage of this said unpatched security flaw.

Zombie

A computer that has been compromised and a remote attacker have an access to it. The attacker uses this computer to forward transmission to other computers on the internet. Attackers typically exploit multiple computers to create a botnet, also known as a zombie army.


Download your free trial of Protegent Antivirus Software:-

Protegent Antivirus

Total Security

Complete Security

Do let us know your thoughts about the cloud antivirus software. Connect with us on TwitterFacebookInstagramLinkedinTumblr and Youtube.

 

WannaCry Ransomware Attack – Most Dangerous Virus Attack

Ransomware is the most malicious virus infection which is affecting users across the world. Ransomware first came into existence in 2012 where it used to fool people by claiming money in behalf of Metropolitan Police. Since then Ransomware always come with new version of malware which infect computers of users across the world and locked it up so that they can’t access the data files present in it. Actually, Ransomware infects the computer system by encrypting the data files present in it, and then demands money in bitcoins from the user to provide the decryption key which can be used to decrypt the data.

Continue reading

Major Sources of Ransomware Attack in Computer System

Computer user might have heard about Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace. Ransomware is getting really popular behind the reason of demand of ransom from the victim user to remove the ransomware encryption on user’s computer system.

Continue reading

How Many forms of Ransomware Exist ?

At the present time, Ransomware is the most popular encryption (or virus) infection affecting computer system across the world with rapidly increasing rate. Ransomware is actually not a virus but a programmed code of malware which doesn’t allows user to access their computer’s data files either by encrypting the files or by even locking the operating system.

Continue reading

Ransomware/Cryptolocker/Locky – Virus or Encryption

ranssomware

Ransomware is a computer program which is specially designed to restrict access to files and data of a particular system when gets into it. Currently Ransomware (alias: Cryptolocker or Locky) is the most popular attacks which are infecting computer system around the world at an increasing rate. Ransomware enters a system through email attachment from trusted domains. Ransomware Removal Tool is still not possible to develop. When the user opens the attachment, it gets into the computer system and executes an encryption program which starts encrypting the data files on the system with a unique encryption key using various algorithms like RSA.

Continue reading