Protected Information Technologies, Inc.

What is Malware?





How can I protect against Malware?
 Go

 

What are malware, viruses, spyware, and cookies and what differentiates them?

Let us take the easy one first. "Malware" is short for malicious software and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware, etc.

What exactly is a virus? Is a "worm" also a virus?

Viruses are computer programs or scripts that attempt to spread from one file to another on a single computer and/or from one computer to another, using a variety of methods, without the knowledge and consent of the computer user.

A worm is a specific type of virus that propagates itself across many computers, usually by creating copies of itself in each computer's memory. Many users define viruses simply as trick programs designed to delete or move hard drive data, which, strictly speaking, is not correct.

From a technical viewpoint, what makes a virus a virus is that it spreads itself. The damage it does is often incidental when making a diagnosis. Obviously, any incidental damage is important, even when authors do not intend to create problems with their viruses; they can still cause harm unintentionally because the author did not anticipate the full effect or unintentional side effects.

The most common method used for spreading a virus is through e-mail attachment (although there are other ways of spreading a virus). Sending a virus, even if designed to be harmless, can cause unforeseen damage.

What is a "Trojan Horse"? Isn't this a virus by any other name?

A Trojan Horse, similar to its Greek mythological counterpart, often presents itself as one form while it is actually another. A Trojan horse, also known as Trojan appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer.

Trojan Horse malware is a virus subset but there are differences worth mentioning. A Trojan Horse meets the definition of virus that most people use, in the sense that it attempts to infiltrate a computer without the user's knowledge or consent. A recent example of malware acting as a Trojan horse is the recent e-mail version of the "Swen" virus, which falsely claimed to be a Microsoft update application.

Trojans typically do one of two things: they either destroy or modify data the moment they launch, such as erase a hard drive, or they attempt to ferret out and steal passwords, credit card numbers, and other such confidential information.

Trojan Horses can be a bigger problem than other types of viruses as they are design to be very destructive or disruptive. Essentially this distinction does not matter in the real world. You can lump viruses, Trojans, and worms together as "things I don't want on my computer or my network".

What are cookies and spyware? How are they different?

A cookie is just a bit of text in a file on your computer, containing a small amount of information that identifies you to a particular website, and whatever information that site wanted to retain about the user when they are visiting.

Cookies are a legitimate tool used by many websites to track visitor information. As an example, I might go to an online store and place an item in the basket, but decide not to buy it right away because I want to think about it. The store can choose to put the information about what products I put into my basket in a cookie stored on my computer. This is an example of a good use of cookies to help the user experience.

The only websites that are supposed to be able to retrieve the information stored in a cookie are the websites that wrote the information in that particular cookie. This should ensure your privacy by stopping anyone other than the site you are visiting from being able to read any cookies left by that site.

Do some websites use cookies to exploit user information?

Unfortunately, yes. Some may deceive users or omit their policies. For example, they may track your Web surfing habits across many different websites without informing you, and then use this data to customize the advertisements you see on websites, etc., typically considered as an invasion of privacy.

It is difficult to identify this and other forms of "cookie abuse", which makes it difficult to decide if, when, and how to block them from ones system. In addition, the acceptable level of shared information varies between users, so it is difficult to create an "anti-cookie" program to meet the needs of everyone.

How does spyware exploit user information?

The spyware problem is similar to the cookie problem from the point of view that both are an invasion of privacy, although spyware is different from cookies, technically speaking. Spyware is a program that runs on your computer and, again, tracks your habits and tailors these patterns for advertisements, etc.

Because it is a computer program rather than just a bit of text in a cookie, spyware can also do some nasty things to ensure that the spyware keeps running and keeps influencing what you see.

How do I know if spyware is running on my computer?

We can use detection programs. Similar to anti-virus software, these programs compare a list of known spyware with files on your computer and can remove any that it detects.

How does spyware install itself on computers?

Common tactics for surreptitious installation include rolling up advertising programs into "free" shareware program downloads, and once the spyware is installed it can download advertisements 24 hours a day and overlay them on websites and programs you are using.

Anti-spyware programs can combat spyware from being installed, but the best strategy is to discriminate what you choose to download and install.

Can spyware send tracked information to other people?

Some forms of spyware monitor a target's Web use or even general computer use and sends this information back to the spyware program's authors for use as they see fit. To fight this kind of problem, a spyware removal tool is obviously helpful, as is a firewall that monitors outgoing connections from your computer.

Other forms of spyware take over parts of your Web browsing interface, forcing you to use their own search engines, where they can track your browsing habits and send pop-up advertisements to you at will.

The biggest concern regarding spyware is that most of them are poorly written or designed. Many people first realize their computer is running spyware when it noticeably slows down or stops responding, especially when doing certain tasks such as browsing websites or retrieving e-mail. In addition, poorly written spyware can often cause your computer to function incorrectly even after it has been removed.

How can I protect against Malware?

The biggest concern for computer users today is security. Identity theft is the fastest growing crime on the Internet. In addition to identity theft are viruses, trogan horses, spyware and spam. This is where we come in to protect you.


• Your computer's software need to be kept patched and current. Your computer operating system, your firmware, your anti-virus application, your anti-spyware application, your anti-spam application, your Internet browser and all your applications must be updated on a regular basis. We can take care of this for you to keep you safe.

• Updates should only be downloaded from reputable sources. It is best that we take care of that for you. We know what sources are reputable.

• Use encryption so viruses and other malware can not get in. We use the same encryption banks use. Very safe.

• Use a firewall. Our bank-grade firewalls add the protection you need.

• You need identity protection. Our identity protection
ensures that your personal information such as usernames, passwords, security codes, account numbers and credit card numbers stay protected as you bank, shop and interact online.

• Prevention is always better than cure. Let us protect you. Or, if you already have a problem let us get rid of it for you.


                




HomeContact Us

Copyright © 2000 Jones Industries, Inc. All rights reserved.