Difference between revisions of "Malicious software"

From Conservapedia
Jump to: navigation, search
m (Added hyperlinks and Proof Read and Categories)
(New section; citation added)
Line 1: Line 1:
'''Malicious software''' (or '''malware'''), often generically called viruses, is [[computer]] [[software]] which deliberately does something harmful to your computer.<ref>malware. Dictionary.com. [http://dictionary.reference.com/browse/malware http://dictionary.reference.com/browse/malware], (accessed: July 13, 2011).</ref> Once downloaded, malware can be passed from one computer to another.  Malware is usually downloaded to a computer by hiding inside rogue (and sometimes legitimate) software packages: the ''Trojan horse'' (or ''Trojan'').<ref>Definition: [http://searchsecurity.techtarget.com/definition/Trojan-horse Trojan horse], searchsecurity.techtarget.com, (Accessed July 13, 2011).</ref><ref>[http://www.foxnews.com/story/0,2933,307602,00.html Apple Macintoshes Targeted by Porn-Based Computer Virus], [[Fox News|FOXNews.com]], November 02, 2007.</ref> While Mac malware is scarcer than [[Windows (operating system)|Windows]] malware, Macs can pass on files that contain malware to Windows users, and one line of defense is to use a Mac [[Anti-virus software|antivirus]] that detects and stops Windows viruses as well as Mac malware.
+
'''Malicious software''' (or '''malware'''), often generically called viruses, is [[computer]] [[software]] which deliberately does something harmful to your computer.<ref>malware. Dictionary.com. [http://dictionary.reference.com/browse/malware http://dictionary.reference.com/browse/malware], (accessed: July 13, 2011).</ref> Once downloaded, malware can be passed from one computer to another.  Malware is usually downloaded to a computer by hiding inside rogue (and sometimes legitimate) software packages: the ''Trojan horse'' (or ''Trojan'').<ref>Definition: [http://searchsecurity.techtarget.com/definition/Trojan-horse Trojan horse], searchsecurity.techtarget.com, (Accessed July 13, 2011).</ref><ref>[http://www.foxnews.com/story/0,2933,307602,00.html Apple Macintoshes Targeted by Porn-Based Computer Virus], [[Fox News|FOXNews.com]], November 02, 2007.</ref>  
  
 
==Symptoms==
 
==Symptoms==
Line 6: Line 6:
 
===Infectious Mobile Devices===
 
===Infectious Mobile Devices===
 
[[Android]] devices and some versions of the [[Apple Inc.|Apple]] iOS mobile operating system are vulnerable to malicious code contained in PDF files.<ref>Amy Gahran. [http://articles.cnn.com/2011-07-11/tech/gahran.ios.malware_1_pdf-files-ios-iphone?_s=PM:TECH iPhone, iPad users: Watch out for malicious PDF files], ''[[CNN]]'', July 11, 2011.</ref><ref>''The Mac Security Blog''. [http://blog.intego.com/2011/07/07/iphone-pdf-vulnerability-creates-security-risks-allows-easy-jailbreaks/ iOS PDF Vulnerability Creates Security Risks, Allows Easy Jailbreaks], blog.intego.com, July 7, 2011.</ref>  Security researchers at [[Intego]] noted that while there is currently no known malware for iOS, files that flow through mobile devices and into [[home]] and [[office]] computers by email or remote storage can contain malware and worms that are harmful to the Mac and Windows operating systems.<ref>Killian Bell. [http://www.cultofmac.com/integos-virusbarrier-for-ios-will-stop-your-iphone-from-being-a-typhoid-mary/104264 Intego’s VirusBarrier for iOS Will Stop Your iPhone From Being A Typhoid Mary], ''Cult of Mac'', July 12, 2011.</ref>  For example, once infected, an [[iPhone]] would act as an [[asymptomatic carrier]], allowing [[criminal|cybercriminals]] to access confidential information, intercept phone conversations or take over other aspects of the infected device.   
 
[[Android]] devices and some versions of the [[Apple Inc.|Apple]] iOS mobile operating system are vulnerable to malicious code contained in PDF files.<ref>Amy Gahran. [http://articles.cnn.com/2011-07-11/tech/gahran.ios.malware_1_pdf-files-ios-iphone?_s=PM:TECH iPhone, iPad users: Watch out for malicious PDF files], ''[[CNN]]'', July 11, 2011.</ref><ref>''The Mac Security Blog''. [http://blog.intego.com/2011/07/07/iphone-pdf-vulnerability-creates-security-risks-allows-easy-jailbreaks/ iOS PDF Vulnerability Creates Security Risks, Allows Easy Jailbreaks], blog.intego.com, July 7, 2011.</ref>  Security researchers at [[Intego]] noted that while there is currently no known malware for iOS, files that flow through mobile devices and into [[home]] and [[office]] computers by email or remote storage can contain malware and worms that are harmful to the Mac and Windows operating systems.<ref>Killian Bell. [http://www.cultofmac.com/integos-virusbarrier-for-ios-will-stop-your-iphone-from-being-a-typhoid-mary/104264 Intego’s VirusBarrier for iOS Will Stop Your iPhone From Being A Typhoid Mary], ''Cult of Mac'', July 12, 2011.</ref>  For example, once infected, an [[iPhone]] would act as an [[asymptomatic carrier]], allowing [[criminal|cybercriminals]] to access confidential information, intercept phone conversations or take over other aspects of the infected device.   
 +
 +
=== Mac Malware ===
 +
While Mac malware is scarcer than [[Windows (operating system)|Windows]] malware, over the last ten years threats targeting Mac OS X have been on the rise and have become more sophisticated.<ref>[https://www.intego.com/mac-security-blog/10-years-of-mac-malware-how-os-x-threats-have-evolved/ 10 Years of Mac Malware: How OS X Threats Have Evolved (Infographic)]</ref> In addition, Macs can pass on files that contain malware to Windows users. For this reason, a layered approach to security is the best defense, including the use of a [[firewall]] and Mac [[Anti-virus software|antivirus]] that detects and stops Windows viruses as well as Mac malware.
  
 
===Other Malware===
 
===Other Malware===

Revision as of 22:28, February 26, 2016

Malicious software (or malware), often generically called viruses, is computer software which deliberately does something harmful to your computer.[1] Once downloaded, malware can be passed from one computer to another. Malware is usually downloaded to a computer by hiding inside rogue (and sometimes legitimate) software packages: the Trojan horse (or Trojan).[2][3]

Symptoms

If a Windows or Mac OS X operating system gets infected by malware, it could cause the loss of important files; business files, digital music and movies, and pictures could be wiped out by a single infection.[4] The malware may slow down the computer or become annoying by sending email to all of the infected users contacts. Worse, it may delete or copy sensitive information on the infected computer or mobile device.

Infectious Mobile Devices

Android devices and some versions of the Apple iOS mobile operating system are vulnerable to malicious code contained in PDF files.[5][6] Security researchers at Intego noted that while there is currently no known malware for iOS, files that flow through mobile devices and into home and office computers by email or remote storage can contain malware and worms that are harmful to the Mac and Windows operating systems.[7] For example, once infected, an iPhone would act as an asymptomatic carrier, allowing cybercriminals to access confidential information, intercept phone conversations or take over other aspects of the infected device.

Mac Malware

While Mac malware is scarcer than Windows malware, over the last ten years threats targeting Mac OS X have been on the rise and have become more sophisticated.[8] In addition, Macs can pass on files that contain malware to Windows users. For this reason, a layered approach to security is the best defense, including the use of a firewall and Mac antivirus that detects and stops Windows viruses as well as Mac malware.

Other Malware

In addition to the Linux Virus, Macro Virus, Windows Virus, and Mac Virus, a number of other types of malware exist for computer operating systems. This includes spyware, adware, keyloggers, and scareware (rogue software that claims to serve a purpose, usually pretending to be security software).

References

  1. malware. Dictionary.com. http://dictionary.reference.com/browse/malware, (accessed: July 13, 2011).
  2. Definition: Trojan horse, searchsecurity.techtarget.com, (Accessed July 13, 2011).
  3. Apple Macintoshes Targeted by Porn-Based Computer Virus, FOXNews.com, November 02, 2007.
  4. The Mac Security Blog. Do You Need an Antivirus for Your Mac? Definitely, Yes., blog.intego.com, December 4, 2008.
  5. Amy Gahran. iPhone, iPad users: Watch out for malicious PDF files, CNN, July 11, 2011.
  6. The Mac Security Blog. iOS PDF Vulnerability Creates Security Risks, Allows Easy Jailbreaks, blog.intego.com, July 7, 2011.
  7. Killian Bell. Intego’s VirusBarrier for iOS Will Stop Your iPhone From Being A Typhoid Mary, Cult of Mac, July 12, 2011.
  8. 10 Years of Mac Malware: How OS X Threats Have Evolved (Infographic)

See Also