Hayat II Group VI
writers

Move your cursor into the image




Bigfoots!



Credits!

basecode: Nurul AtiQah
Edit by: Cikmimin
Re-Edited By: Your Name
Others:   


SCL 2(2)

SCL 2 : COMPUTER SOFTWARE
Types Of malware
What It Does
How To Repair or Removed
1.     Phishing
v  An email fraud scan conducted for the purpose of information or identity theft

v  Perpetrator sends out legitimak-looking email in an attempt to gather financial information from recipiants
o   Boot into safe mode with networking

o   Make sure the PC have the latest and up-to-date antivirus protection such as Kapersky

2.      Trojan Horses
v  Trojan horses may steal information ,or harm their host PC

v  Trojan may use drive-by downloads or mistall via online games or internet-driven application in order or reach target PC


o   Used antivirus software and anti-malware

o   Should always only download and install software when you has exactly know what is it and where it is come from
3.      Worm
v  It use network share and connection to connect to other system to spread themselves.

v  Some of worm even use instant message to sent themselves to all the contacts.

v  It also used infected system to infect as many other system as possible.
o   Use windows like safety scanner

o   Also use malicious software removal tools
4.      Ransomware
v  Works by taking control of your system ad holding your information hostage until you pay the ransom to your attacks to get your data back.
o   Antivirus and anti-malware help protect your data by stopping ransomware attacks before they can touch and harm your data
5.     Fake AV
v  It is fake antivirus software that used to cheat people and actually spread virus.
o   Running full security suite

o   Having modern security suite

o   Ensure that we actually know the antivirus application background before download.