Cybersecurity Threats: Malware

Unfortunately, malware is not a foreign term. In fact, it’s pretty well known to anyone that uses a computer.

There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away.

First, let’s take a quick tour of the types of malware you may run into.

 

TYPES OF MALWARE

 

Viruses

These act very similar to the flu virus. Once it gets into a computer, it propagates by copying itself and becoming part of another program. Then just like the flu at an elementary school, it spreads from computer to computer. However, a virus must be activated by opening or running the infected file.

Viruses also include worms and trojans.

Spyware

This form of malware works just as its name intends. It is software that usually piggybacks on legitimate downloads. Once it is in your computer, it spies on the information you key in and sends it to a website. The first sign of spyware usually is a slow computer since it takes up many resources to run.

Adware

We all know this one too well. Those pesky pop-ups telling you your computer is infected or that you won money.

These also piggyback on other applications or downloads, such as free computer wallpaper, widgets, or toolbars.

Adware is kind of tricky, inherently it isn’t dangerous to your computer. Annoying, but not dangerous. However, once clicked on you’ve basically opened the floodgates.

Ransomware

With the popularity of cryptocurrency, ransomware has become more and more abundant. Often, this type of malware won’t damage your computer…right away. Instead, it locks it and holds it hostage.

The hacker asks for a ransom and will provide a key to unlock your data only if and once the ransom has been paid. If not, the hacker will usually wipe your device of all of its data.

Botware

This is another malware beginning to gain popularity largely due to the cryptocurrency gold rush.

Botware ultimately turns your computer into a zombie controlled by the perpetrator. They can use their army of bot devices to do things like taking down websites by overwhelming them with traffic or stealthily mine cryptocurrency for themselves. Botware helps hide anything going on below the surface to remain undetected.

A surprising symptom of botware is often a higher electric bill. Your computer’s CPU will be running constantly and the fan will run for longer than usual.

 

MALVERTISING

Now that you are a bit more familiar with the mischievous malware that could corrupt your devices, it’s time to delve into a lesser-known malware scam: malvertising.

This has been gaining headway on Google. So much so, they created an individual landing page asking consumers to report malvertising and explaining how to combat it.

The way this works is that cyber-criminals utilize several types of display advertisements to distribute malware. A few ways you’d see malvertising is through auto-redirecting ads that will take you to a phishing page, clickbait, and malicious code hidden within an ad.

Sadly, cybercriminals usually use legitimate ad networks because of the high volume of ads they distribute. It makes it incredibly easy for them to throw malicious code into an ad without the advertiser having the slightest clue.

The worst malvertising connects users’ computers to an exploit kit that runs analysis on the defending computer, looking for vulnerabilities and exploiting them. From there, attackers can install malware, ransomware, or gain full access to the computer and sensitive information. Sometimes Google may even flag your website for hosting malware, which will affect how you show up in search results.

Like most other malware situations, the best way to keep it from ruining your device or even your life is to keep everything up to date. It is important to ensure any scripts ads may be running on are current. This includes programs like Java, Flash, and Microsoft Silverlight. Ad networks are working hard to stay above the curve, but it is your responsibility to help with that.

Be sure to report any suspicious ads to Google. If the ad’s script contains suspicious code, including encrypted code, it should be treated with suspicion. Remove the ad from your website and report it to your ad network. Also, there are many ad verification websites that help back-check ads for suspicious code.

The bottom line with any mischievous malware is to keep your eyes open and report foul play.

Security Posters

Take charge of 2025

IT is no longer a back-office function—it’s a driver of growth and innovation. By tackling this checklist, you can ensure your business is ready to thrive in the face of challenges and opportunities alike.

Ready to transform your IT strategy? Schedule a free consultation with Techvera today.

Techvera icon

Written by Team Techvera

l

October 7, 2019

You May Also Like…

IT Checklist: What Small Businesses Need To Prioritize in 2025

IT Checklist: What Small Businesses Need To Prioritize in 2025

Now is the perfect time to revisit your IT structure, processes, and strategy to ensure your small business operates at its fullest potential. From defending against evolving cyber threats to supporting hybrid teams and boosting productivity, a robust IT strategy is essential to staying ahead in today’s competitive market.

Here’s a refreshed IT checklist to set your business up for success in the year ahead.

Skip to content