Malicious software

Course- Cyber >

Software designed specifically to make an electronic device perform things it has not been designed to do, almost always to cause damage, steal, corrupt or encrypt data, or otherwise allow a third party to control the device (e.g. to send spam) and cause other headaches.

 

Malicious software comes in many varieties with names such as “virus”, “worm”, “Trojan horse”, “rootkit”, “macro”, “logic bomb”, “backdoor” and several others. No computing device is immune to such malware: computers, tablets and smartphones are vulnerable and have all become targets.

 

Why is this an issue?

Malware designers have gone professional and are able to design, share and sell cyber-tools to attack primarily those who are unprepared. Indications to-date suggest that even those who are reasonably prepared can be successfully attacked.

 

What you should do about it

The actions listed below reflect lessons learned over the years and some of these topics appear several times in this tutorial. The precautionary principle of Better Safe Than Sorry is worth following. The most important measures are:

 

  • Make sure your devices software, including good quality security software is up to date
  • Use a security-conscious Internet service provider (ISP) – “free” WiFi may not be secure
  • Ensure that the websites you visit are legitimate and trustworthy before you go there – some sites are designed to infect your computer with malware
  • Exercise caution when downloading files from the Internet
  • Think carefully before installing any new software, particularly those that are “free”. If you can, remove software pre-installed in your devices that you do not need or want (see 3 “crapware”)
  • Scan memory devices (such USB devices) that were given to you as a gift or were found
  • Be suspicious of random pop-up windows and error messages
  • Beware of attachments you don’t expect
  • Ignore any spam that may get through your filters
  • Use security precautions software for your smartphone, tablet and other devices
  • Systematically back up your files
  • Ensure that your anti-virus software checks the files as they download and quarantines them if necessary
  • Behave online as you would in real life: If in doubt, don’t do it.