Though many who frequent Edgy Labs are technically inclined, sometimes we all need a cheat sheet for certain things.
The Internet can sometimes be a bit of a Wild West. You need to know how to protect yourself from malware, viruses, and the like. Knowing the difference between all of these terms is a solid first step.
Here, we’ll highlight the key differences between scareware, viruses, and spyware here for you.
Spyware: Identified by Behavior
There are many types of spyware and, oftentimes, this category overlaps with malware. Malware, of course, is shorthand for “malicious software”.
Most “spyware” types get their names from the functions they perform or how the programs behave. Spyware usually watches what you do to attain personal information such as passwords.
They can spy through your computer’s webcam, listen through microphones, and more. But many antivirus programs have protections against spyware.
Spyware can be anything from the following list:
- Rootkits — these tap into your PC’s operating system and hide malicious programs in the components. They can also hide in Registries.
- Adware — this forces unwanted pop-ups like advertisements that can be personally targeted, having used stolen information.
- Dropper programs — smaller programs that exist to aid bigger malware. They can funnel more malware onto your PC while remaining fairly unnoticed.
- Bots — you might recall this from our coverage of the WannaCry attacks. Bots can help someone remotely take over your device, then use your power to attack another system.
This also includes ransomware — programs that may hold your data “hostage”, often demanding a monetary ransom for surrender.
Viruses: Identified by Replication
In contrast to spyware and ransomware, you can identify viruses by the way they spread.
Their essential function differs from spyware in that viruses work differently, but most viruses still gather information for nefarious means.
The two main types of computer virus include worms and Trojans.
As you might suspect, Trojans reference the classic epic tale of the Trojan horse.
Trojan viruses work the same way as the Greeks did in tricking the Trojans. They smuggle in malicious code to eventually do something harmful like steal personal data or drain bank accounts.
Worms self-replicate, copying themselves to use tons of bandwidth or crash systems.
One of the most notable recent cases of a newsworthy virus was the orangeworm Kwampir.
Scareware: Ineffective or Fake/Harmful “Antivirus”
This last section is aimed at exploiting people’s fears of being hacked.
Scareware is not inherently bad itself, but it can provoke people to spend unnecessary money on ultimately useless “antivirus” programs.
Some do include harmful aspects, as well, including something as simple as handing over your payment information to a potentially malicious company.
Doing thorough research about programs before downloading and/or paying for them is always a good practice — especially when it comes to antivirus programs.
In order to avoid data security compromises, regularly check sites like haveibeenpwned.com to see if your emails have gotten hacked recently.
That combined with a solid antivirus like Webroot could be immensely beneficial in maintaining your computer’s overall digital health.
Comments (0)
Least Recent