SCL 2(2)
SCL 2 : COMPUTER SOFTWARE
Types Of malware
|
What It Does
|
How To Repair or Removed
|
1.
Phishing
|
v
An email fraud scan conducted for the purpose
of information or identity theft
v
Perpetrator sends out legitimak-looking email
in an attempt to gather financial information from recipiants
|
o
Boot into safe mode with networking
o
Make sure the PC have the latest and up-to-date antivirus
protection such as Kapersky
|
2.
Trojan Horses
|
v Trojan horses
may steal information ,or harm their host PC
v Trojan may
use drive-by downloads or mistall via online games or internet-driven
application in order or reach target PC
|
o
Used antivirus software and anti-malware
o
Should always only download and install software when you
has exactly know what is it and where it is come from
|
3.
Worm
|
v It use
network share and connection to connect to other system to spread themselves.
v Some of worm
even use instant message to sent themselves to all the contacts.
v It also used
infected system to infect as many other system as possible.
|
o
Use windows like safety scanner
o
Also use malicious software removal tools
|
4.
Ransomware
|
v Works by
taking control of your system ad holding your information hostage until you
pay the ransom to your attacks to get your data back.
|
o
Antivirus and anti-malware help protect your data by
stopping ransomware attacks before they can touch and harm your data
|
5.
Fake AV
|
v It is fake
antivirus software that used to cheat people and actually spread virus.
|
o
Running full security suite
o
Having modern security suite
o
Ensure that we actually know the antivirus application
background before download.
|