SkipToMainContent

Malware

What is malware and how can we prevent it?

 

Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner. There are various types of malware, including spyware, ransomware, viruses, worms, Trojan horses, adware, or any type of malicious code that infiltrates a computer.

Generally, software is considered malware based on the intent of the creator rather than its actual features. Malware creation is on the rise due to money that can be made through organized Internet crime. Originally malware was created for experiments and pranks, but eventually it was used for vandalism and destruction of targeted machines. Today, much of malware is created to make a profit from forced advertising (adware), stealing sensitive information (spyware), spreading email spam or child pornography (zombie computers), or extorting money (ransomware).

Various factors can make computers more vulnerable to malware attacks, including defects in the operating system (OS) design, all of the computers on a network running the same OS, giving users too many permissions, or just because a computer runs on a particular operating system, such as Windows, for example.

The best protection from malware — whether ransomware, bots, browser hijackers, or other malicious software — continues to be the usual, preventive advice: be careful about what email attachments you open, be cautious when surfing by staying away from suspicious websites, and install and maintain an updated, quality antivirus program.

 

  • Android malware

    The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again.

    Read More
  • How Norton keeps you shaded from silent but deadly threats

    On May 19th, 2014 Blackshades made news headlines when the FBI and Europol announced (link is external) that they had arrested dozens of individuals suspected of cybercriminal activity centered around the malware.

    Read More
  • Macro viruses

    A macro virus is defined as “a computer virus written in the same macro language used for software applications, such as word processors.”

    Read More
  • Malware 101: How do I get malware? Complex attacks

    In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about…

    Read More
  • Malware 101: How do I get malware? Simple attacks

    We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer?

    Read More
  • OS X malware

    Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…

    Read More
  • Ransomware: 5 dos and don'ts

    Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...

    Read More
  • Safely and securely use memory sticks

    You may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true, they are susceptible to being exploited like everything else…

    Read More
  • Virus FAQ

    Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…

    Read More
  • Webcam hacking

    You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.

    Read More
  • What Is A Computer Virus?

    A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…

    Read More
  • What are malicious websites?

    Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.

    Read More
  • What is a Trojan?

    Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.

    Read More
  • What is a botnet?

    The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.

    Read More
  • What is cryptojacking? How it works and how to help prevent it

    Cryptojacking is the unauthorized use of your computer and devices by cybercriminals in order to mine for cryptocurrency.

    Read More
  • Privacy

    Equip yourself with best practices to take control of what you share online. Read articles about how to keep your online activity and identity private.

    Read More
  • Online Scams

    Learn how to spot and avoid falling for online scams. Read all about the types of scams that cybercriminals use to steal information and commit identity theft.

    Read More
  • Kids' Safety

    With the right information at your fingertips, you can make better decisions for your child’s cyber safety. Read articles about online security for your family.

    Read More