SlideShare a Scribd company logo
MALWARE
LIST OF MALWARE
 Virus
 Worms
 Trojans
 Logic Bombs
 Rootkits
 Backdoors
 Botnet
 Spyware
 Adware
 Key Loggers
 Rogue security software
 Ransomware
 Browser Hijacker
VIRUS
 It is a malicious computer code that reproduce itself on
the same computer.
Attacks:
 A virus first inserts itself into a computer files, these
are several types:
1.Erases files from hardware.
2.Reformatted the hard disk drive.
3.Turned off the computer’s security settings.
4.Caused to crash a computer repeatedly.
VIRUS PROTECTION
 Install an antivirus program.
 Don't open email attachments unless you're
expecting them.
 Keep your computer updated.
 Use a firewall. Windows Firewall (or any other
firewall) can help alert you to suspicious activity if a
virus attempts to connect to your computer.
VIRUS REMOVAL
 Enter Safe Mode. Keep your PC disconnected from
the Internet, and don't use it until you're ready to
clean your PC.
 Delete Temporary Files. Now that you're in Safe
Mode, you'll want to run a virus scan.
 Download Malware Scanners.
 Run a Scan With Malwarebytes.
WORMS
 A Worm is a malicious computer code that
reproduce itself on the same computer and on the
other computer by using the networks.
Attacks:
It searches for the same vulnerabilities in other
computer’s in a network and effects them.
WORM PROTECTION
 Scanning any potentially suspicious files with an
antivirus solution.
 Keeping antivirus programs up-to-date.
Worm Removal:
 Enter Safe Mode. Keep your PC disconnected from
the Internet, and don't use it until you're ready to
clean your PC.
 Download Malware Scanners.
TROJANS
 It is an executable program, advertisers performing
one activity, but actually does something else which
may effects the computer.
Attacks:
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers or
computer networks
TROJANS PROTECTION
 Protect your computer with strong security
software.
 Enable automatic Windows updates.
 Be careful when engaging in peer-to-peer (P2P)
file-sharing.
 Download the latest version of your browser.
TROJAN REMOVAL
 Disable System Restore.
 Install an anti-malware program, if you haven’t
already.
 Reboot into Safe Mode.
ROOTKIT
 Rootkit is a set of software used by attacker to hide
the actions of the other types of malicious software.
By hiding Log-in records.
Attacks:
They alter or replace OS files with modified versions
designed to ignore malicious activities.
ROOTKIT PROTECTION
 Disable Auto run windows PC.
 Install tools that will protect the computer from
rootkits.
 Anti Rootkit tools like AVG Anti-Rootkit, Panda Anti-
Rootkit, Malwarebytes Anti-Rootkit.
ROOTKIT REMOVAL
 By using one of the tools named Bitdefender
Rootkit Remover, we can remove Rootkit.
 The Bitdefender Rootkit Remover deals with known
rootkits quickly and effectively and removes from
PC.
LOGIC BOMBS
A logic bomb is a piece of code intentionally inserted
into a software system that will set off a malicious
function when specified conditions are met.
Attacks:
 A dissatisfied employee had counted on this to
cause the company’s stock to drop; the employee
can earn money from the price drop.
 Attackers can also use a combination of spyware
and logic bombs in an attempt to steal your identity
LOGIC BOMBS PROTECTION
 Do not download pirated software -- Logic bombs
can by distributed by exploits that promote software
piracy.
 Do not click on suspicious web links -- Clicking on
an unsafe link may direct you to an infected website
that may host the logic bomb malware.
 Apply patches to other software installed on your
computer- like such as Microsoft Office software,
Adobe products.
LOGIC BOMBS REMOVAL
 Run Malwarebytes Anti-Malware.
 Run the anti spyware removal programs Spybot -
Search & Destroy.
ADWARE
 It is a software program that delivers
advertising unwanted for the users.
 It also performs tracking functions.
Attacks:
 Adware ,it usually includes code that tracks a
user's personal information and passes it on to
third parties, without the user's authorization or
knowledge. This practice has been dubbed
spyware and has prompted an outcry from
computer security and privacy advocates,
including the Electronic Privacy Information
Centre.
ADWARE PROTECTION
 Remove browser add-ons
 You might need to remove add-ons from your
browser:
 Manage add-ons in Internet Explorer
 Disable or remove Add-ons in Firefox
 Uninstall extensions in chrome
ADWARE REMOVAL
 Uninstall Pop-up Ads malicious programs from your
computer
 Remove Pop-up Ads from Internet Explorer, Firefox
and
 Remove Pop-up Ads virus with Malwarebytes Anti-
Malware Free
BROWSER HIJACKER
 Browser hijacking is the modification of a web
browsers’ settings. The term hijacking is used as
the changes are performed without the user's
permission. A browser hijacker may replace the
existing home page, error page, or search page
with its own.
ATTACK:
 Browser hijackers are generally distributed by
downloading shareware or freeware applications
from malicious and unauthorized websites. If you
have clicked any pop-ups or ads link which displays
click ‘Yes’ or ‘No’ then that link might have
downloaded browser hijacker in your PC.
BROWSER HIJACKER PROTECTION
 Remain up to date with Windows security updates
as they help you to improve your computer’s
security and you will be safe.
 Install a good anti-spyware software on your PC
which will act as a shield between your PC and
Browser Hijacker and protect it from any Browser
Hijacker inventions.
 Update your anti-spyware software definitions on a
regular basis at least once a day. This will help you
to detect new Browser Hijacker’s on your PC.
BROWSER HIJACKER REMOVAL
 Scan for Browser Hijacker’s and other threats on
your PC on a regular basis at least once a week.
KEY LOGGERS
A key logger can be hardware or
software.
Attacks:
A key logger inspects keystrikes and send the
information to the attacker.
KEY LOGGERS PROTECTION
 Make sure that no unwanted hardware device is
connected to your computer.
 Install and scan your computer with anti-malware
software.
 keeping track of your authorized programs may be
all you need to do. If there’s a mystery guest on
your control panel.
KEY LOGGERS REMOVAL
 Many software tools can be used to get rid of
keylogging.
 If there is any keylogging device connected your
computer, disconnect it.
 Install absolute keylogger removal tool.
RANSOMWARE
 Ransomware is a type of malware which restricts
access to the computer system that it infects, and
demands a ransom paid to the creator(s) of the
malware in order for the restriction to be removed.
RANSOMWARE PROTECTION
 Keep all of the software on your computer up to
date. Make sure automatic updating is turned on to
get all the latest Microsoft security updates.
 Keep your firewall turned on.
 Don't open spam email messages.
 Scan your computer with the Microsoft Safety
Scanner.
RANSOMWARE REMOVAL
 To detect and remove ransomware and other
malicious software that might be installed on your
computer, run a full-system scan with an
appropriate, up-to-date, security solution. The
following Microsoft products can detect and remove
this threat:
 Windows Defender (built into Windows 8)
 Microsoft Security Essentials
 Microsoft Safety Scanner
BOTNET
Criminals distribute malicious software that can
turn your computer in to a bot also known as
zombie when it occurs it performs automated
task over the internet. They use it to send out
spam emails and messages. If this occurs to
your computer then your computer will get slow
down and you might be helping criminals.
BOTNET PROTECTION
 E-mail with malware as an attachment.
 Drive-by malware.
 Plug-in and application risks.
 Hazard: data storage devices.
BOTNET REMOVAL
 Phrozensoft Mirage Anti-Bot.
 Trend Micro RUBotted.
 Norton Power Eraser.
 BotHunter.
 Avira BotFrei.
BACKDOORS
 A backdoors is a mean of access to a computer
program that bypasses security mechanisms.
Attacks:
 Back door can be an installed program or could be
a modification to an existing program. The installed
program may allow a user log on to the computer
without a password with administrative privileges.
Many programs are available on internet to create
back door attacks on systems. One of the more
popular tools is Back Orifice which is also available
for free download on internet.
BACKDOORS PROTECTION
 Profiling the website's traffic and comparing it
against an extensive database of backdoors.
 Enabling the detection to overcome file obfuscation
and signature mutation.
BACKDOORS REMOVAL
 When AVG real-time antivirus protection detects a
virus in your computer, the AVG Detection window
is displayed, with two options:
 Protect Me: this is the recommended action. It will
remove the threat from your device.
 Ignore the threat: will do nothing to remove the
virus, however the file will be blocked so infection
won't spread.
 It is recommended to perform a full device scan
after dealing with any threat, to make sure it was
successfully deleted.
SPYWARE
Spyware is infiltration software that secretly monitors unsuspecting
users. It can enable a hacker to obtain sensitive information, such
as passwords, from the user's computer. Spyware exploits user
and application vulnerabilities and is often attached to free online
software downloads or to links that are clicked by users.
Attacks:
•Slow computer performance.
• System instability .
• New browser toolbars or menu.
• New shortcuts.
• Hijacked home page.
• Increased pop-ups.
SPYWARE PROTECTION
 The use of system resources, including what
programs are installed on their computers.
 The collection,use,and distribution of personal or
otherwise sensitive information.
 Material changes that affect the user experience
privacy, or system security.
SPYWARE REMOVAL
 Check Installed Programs for items that don't
belong on your computer. Use this method with
extreme caution. Control Panel lists many
programs, most of which are not spyware.
 Reinstall Windows. Some spyware can hide itself
so well that it can't be removed.
ROGUE SECURITY SOFTWARE
 This one deceives or misleads users. It pretends to
be a good program to remove Malware infections,
but all the while it is the Malware. Often it will turn
off the real Anti-Virus software. The next image
shows the typical screen for this Malware program,
Antivirus 2010.
ATTACKS
 Gives a false sense of security.
 Fraudulent transaction.
 Interrupts legitimate security program operations.
 Prevents you from visiting legitimate security
software vendor sites
PROTECT
 The best way to avoid rogues is to prevent them
from being installed in the first place.
 Another way you can protect yourself is to be wary.
Legitimate security companies won’t try to scare
you into using their scanners.
REMOVE
 Don’t pay the fee they ask for – this could create
further problems and expose you to further fraud or
identity theft.
 If you have problems getting rid of a rogue the
following article might help
List of Malwares

More Related Content

PPTX
Antivirus
ava & araf co.
 
ODP
Computer virus
Maxie Santos
 
PDF
What is malware
Malcolm York
 
PPTX
Email phishing and countermeasures
Jorge Sebastiao
 
PDF
How To Protect From Malware
INFONAUTICS GmbH
 
PPT
Operating Systems
Dan Hess
 
PPTX
Windows Hacking
Mayur Sutariya
 
PPTX
Brute force attack
joycruiser
 
Antivirus
ava & araf co.
 
Computer virus
Maxie Santos
 
What is malware
Malcolm York
 
Email phishing and countermeasures
Jorge Sebastiao
 
How To Protect From Malware
INFONAUTICS GmbH
 
Operating Systems
Dan Hess
 
Windows Hacking
Mayur Sutariya
 
Brute force attack
joycruiser
 

What's hot (20)

PPTX
Spamming
Yash Shrivastava
 
PPT
How Computer Viruses Work
Cerise Anderson
 
PPT
Counter Measures Of Virus
shusrusha
 
PPTX
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
PDF
Phishing and prevention
Stephen Hasford
 
PPTX
Phishing
Sagar Rai
 
PPT
Computer viruses
PRANJAL SAIKIA
 
DOCX
курсова работа по васил стоилов 12004
VasilStoilov
 
PPTX
E mail Investigation
Dr Raghu Khimani
 
PPTX
Cybersecurity
A. Shamel
 
PPTX
Data Backup (IT) Lecture Slide # 5
Muhammad Talha Zaroon
 
PPTX
Mobile security in Cyber Security
Geo Marian
 
PPT
Phishing
anjalika sinha
 
PDF
Computer Security Threats
Quick Heal Technologies Ltd.
 
PPTX
Web security
Padam Banthia
 
PPTX
CYBER SECURITY
Mohammad Shakirul islam
 
PPTX
Network security
fatimasaham
 
PPT
Vpn
Ankit Anand
 
PPTX
Antivirus software
Shreya Singireddy
 
PPTX
Computer security risks
Aasim Mushtaq
 
How Computer Viruses Work
Cerise Anderson
 
Counter Measures Of Virus
shusrusha
 
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Phishing and prevention
Stephen Hasford
 
Phishing
Sagar Rai
 
Computer viruses
PRANJAL SAIKIA
 
курсова работа по васил стоилов 12004
VasilStoilov
 
E mail Investigation
Dr Raghu Khimani
 
Cybersecurity
A. Shamel
 
Data Backup (IT) Lecture Slide # 5
Muhammad Talha Zaroon
 
Mobile security in Cyber Security
Geo Marian
 
Phishing
anjalika sinha
 
Computer Security Threats
Quick Heal Technologies Ltd.
 
Web security
Padam Banthia
 
CYBER SECURITY
Mohammad Shakirul islam
 
Network security
fatimasaham
 
Antivirus software
Shreya Singireddy
 
Computer security risks
Aasim Mushtaq
 
Ad

Viewers also liked (17)

PPTX
SSL Technology
Pushpraj Verma
 
PDF
Final Project Report Nadar
Maher Nadar
 
DOCX
Malware protection system
seren1secugenius
 
PPT
Application protocols
Online
 
PDF
Malicious File for Exploiting Forensic Software
Takahiro Haruyama
 
PPTX
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
 
PDF
Volatile IOCs for Fast Incident Response
Takahiro Haruyama
 
PPTX
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
Rhydham Joshi
 
PPTX
REMnux tutorial-2: Extraction and decoding of Artifacts
Rhydham Joshi
 
PPTX
Malware Analysis and Defeating using Virtual Machines
intertelinvestigations
 
PPTX
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
Rhydham Joshi
 
PDF
Windows Memory Forensic Analysis using EnCase
Takahiro Haruyama
 
PPTX
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
PDF
8 Authentication Security Protocols
guestfbf635
 
PPTX
Virus and worms
Vikas Sharma
 
PPT
Introduction to Information Security
Dr. Loganathan R
 
PPTX
Internet protocol (ip) ppt
Dulith Kasun
 
SSL Technology
Pushpraj Verma
 
Final Project Report Nadar
Maher Nadar
 
Malware protection system
seren1secugenius
 
Application protocols
Online
 
Malicious File for Exploiting Forensic Software
Takahiro Haruyama
 
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
 
Volatile IOCs for Fast Incident Response
Takahiro Haruyama
 
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
Rhydham Joshi
 
REMnux tutorial-2: Extraction and decoding of Artifacts
Rhydham Joshi
 
Malware Analysis and Defeating using Virtual Machines
intertelinvestigations
 
Remnux tutorial-1 Statically Analyse Portable Executable(PE) Files
Rhydham Joshi
 
Windows Memory Forensic Analysis using EnCase
Takahiro Haruyama
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
8 Authentication Security Protocols
guestfbf635
 
Virus and worms
Vikas Sharma
 
Introduction to Information Security
Dr. Loganathan R
 
Internet protocol (ip) ppt
Dulith Kasun
 
Ad

Similar to List of Malwares (20)

PPT
Computer virus and antivirus
BESOR ACADEMY
 
PPT
Understanding security and safe computing
Mukul Kumar
 
PPTX
Computer security threats & prevention
PriSim
 
PPTX
Computer Virus ppt.pptx
PragatiKachhi1
 
PPTX
Defensive measure of virus
Abrish06
 
PPTX
How To Protect Your Home PC
thatfunguygeek
 
ODP
Virus and antivirus final ppt
aritradutta22
 
PPTX
Virus and types of antivirus
Shabnam Bashir
 
PPT
Virus
Mukul Kumar
 
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
PPT
Computer viruses and antiviruses
Sanguine_Eva
 
PPTX
Antivirus
Meti Liona
 
PPTX
Types of malicious software and remedies
Manish Kumar
 
PPTX
Compter virus and its solution
Manoj Dongare
 
PDF
Malwarebytes Anti-Malware Crack
RaahaugeHerbert0
 
PDF
Malwarebytes Anti-Malware Crack
ClancyClancy9
 
PPTX
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computer virus and antivirus
BESOR ACADEMY
 
Understanding security and safe computing
Mukul Kumar
 
Computer security threats & prevention
PriSim
 
Computer Virus ppt.pptx
PragatiKachhi1
 
Defensive measure of virus
Abrish06
 
How To Protect Your Home PC
thatfunguygeek
 
Virus and antivirus final ppt
aritradutta22
 
Virus and types of antivirus
Shabnam Bashir
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Computer viruses and antiviruses PPT
Eva Harshita
 
Computer viruses and antiviruses
Sanguine_Eva
 
Antivirus
Meti Liona
 
Types of malicious software and remedies
Manish Kumar
 
Compter virus and its solution
Manoj Dongare
 
Malwarebytes Anti-Malware Crack
RaahaugeHerbert0
 
Malwarebytes Anti-Malware Crack
ClancyClancy9
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 

Recently uploaded (20)

PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
CDH. pptx
AneetaSharma15
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
CDH. pptx
AneetaSharma15
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 

List of Malwares

  • 2. LIST OF MALWARE  Virus  Worms  Trojans  Logic Bombs  Rootkits  Backdoors  Botnet  Spyware  Adware  Key Loggers  Rogue security software  Ransomware  Browser Hijacker
  • 3. VIRUS  It is a malicious computer code that reproduce itself on the same computer. Attacks:  A virus first inserts itself into a computer files, these are several types: 1.Erases files from hardware. 2.Reformatted the hard disk drive. 3.Turned off the computer’s security settings. 4.Caused to crash a computer repeatedly.
  • 4. VIRUS PROTECTION  Install an antivirus program.  Don't open email attachments unless you're expecting them.  Keep your computer updated.  Use a firewall. Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus attempts to connect to your computer.
  • 5. VIRUS REMOVAL  Enter Safe Mode. Keep your PC disconnected from the Internet, and don't use it until you're ready to clean your PC.  Delete Temporary Files. Now that you're in Safe Mode, you'll want to run a virus scan.  Download Malware Scanners.  Run a Scan With Malwarebytes.
  • 6. WORMS  A Worm is a malicious computer code that reproduce itself on the same computer and on the other computer by using the networks. Attacks: It searches for the same vulnerabilities in other computer’s in a network and effects them.
  • 7. WORM PROTECTION  Scanning any potentially suspicious files with an antivirus solution.  Keeping antivirus programs up-to-date. Worm Removal:  Enter Safe Mode. Keep your PC disconnected from the Internet, and don't use it until you're ready to clean your PC.  Download Malware Scanners.
  • 8. TROJANS  It is an executable program, advertisers performing one activity, but actually does something else which may effects the computer. Attacks:  Deleting data  Blocking data  Modifying data  Copying data  Disrupting the performance of computers or computer networks
  • 9. TROJANS PROTECTION  Protect your computer with strong security software.  Enable automatic Windows updates.  Be careful when engaging in peer-to-peer (P2P) file-sharing.  Download the latest version of your browser.
  • 10. TROJAN REMOVAL  Disable System Restore.  Install an anti-malware program, if you haven’t already.  Reboot into Safe Mode.
  • 11. ROOTKIT  Rootkit is a set of software used by attacker to hide the actions of the other types of malicious software. By hiding Log-in records. Attacks: They alter or replace OS files with modified versions designed to ignore malicious activities.
  • 12. ROOTKIT PROTECTION  Disable Auto run windows PC.  Install tools that will protect the computer from rootkits.  Anti Rootkit tools like AVG Anti-Rootkit, Panda Anti- Rootkit, Malwarebytes Anti-Rootkit.
  • 13. ROOTKIT REMOVAL  By using one of the tools named Bitdefender Rootkit Remover, we can remove Rootkit.  The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively and removes from PC.
  • 14. LOGIC BOMBS A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. Attacks:  A dissatisfied employee had counted on this to cause the company’s stock to drop; the employee can earn money from the price drop.  Attackers can also use a combination of spyware and logic bombs in an attempt to steal your identity
  • 15. LOGIC BOMBS PROTECTION  Do not download pirated software -- Logic bombs can by distributed by exploits that promote software piracy.  Do not click on suspicious web links -- Clicking on an unsafe link may direct you to an infected website that may host the logic bomb malware.  Apply patches to other software installed on your computer- like such as Microsoft Office software, Adobe products.
  • 16. LOGIC BOMBS REMOVAL  Run Malwarebytes Anti-Malware.  Run the anti spyware removal programs Spybot - Search & Destroy.
  • 17. ADWARE  It is a software program that delivers advertising unwanted for the users.  It also performs tracking functions. Attacks:  Adware ,it usually includes code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge. This practice has been dubbed spyware and has prompted an outcry from computer security and privacy advocates, including the Electronic Privacy Information Centre.
  • 18. ADWARE PROTECTION  Remove browser add-ons  You might need to remove add-ons from your browser:  Manage add-ons in Internet Explorer  Disable or remove Add-ons in Firefox  Uninstall extensions in chrome
  • 19. ADWARE REMOVAL  Uninstall Pop-up Ads malicious programs from your computer  Remove Pop-up Ads from Internet Explorer, Firefox and  Remove Pop-up Ads virus with Malwarebytes Anti- Malware Free
  • 20. BROWSER HIJACKER  Browser hijacking is the modification of a web browsers’ settings. The term hijacking is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page, error page, or search page with its own. ATTACK:  Browser hijackers are generally distributed by downloading shareware or freeware applications from malicious and unauthorized websites. If you have clicked any pop-ups or ads link which displays click ‘Yes’ or ‘No’ then that link might have downloaded browser hijacker in your PC.
  • 21. BROWSER HIJACKER PROTECTION  Remain up to date with Windows security updates as they help you to improve your computer’s security and you will be safe.  Install a good anti-spyware software on your PC which will act as a shield between your PC and Browser Hijacker and protect it from any Browser Hijacker inventions.  Update your anti-spyware software definitions on a regular basis at least once a day. This will help you to detect new Browser Hijacker’s on your PC.
  • 22. BROWSER HIJACKER REMOVAL  Scan for Browser Hijacker’s and other threats on your PC on a regular basis at least once a week.
  • 23. KEY LOGGERS A key logger can be hardware or software. Attacks: A key logger inspects keystrikes and send the information to the attacker.
  • 24. KEY LOGGERS PROTECTION  Make sure that no unwanted hardware device is connected to your computer.  Install and scan your computer with anti-malware software.  keeping track of your authorized programs may be all you need to do. If there’s a mystery guest on your control panel.
  • 25. KEY LOGGERS REMOVAL  Many software tools can be used to get rid of keylogging.  If there is any keylogging device connected your computer, disconnect it.  Install absolute keylogger removal tool.
  • 26. RANSOMWARE  Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
  • 27. RANSOMWARE PROTECTION  Keep all of the software on your computer up to date. Make sure automatic updating is turned on to get all the latest Microsoft security updates.  Keep your firewall turned on.  Don't open spam email messages.  Scan your computer with the Microsoft Safety Scanner.
  • 28. RANSOMWARE REMOVAL  To detect and remove ransomware and other malicious software that might be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products can detect and remove this threat:  Windows Defender (built into Windows 8)  Microsoft Security Essentials  Microsoft Safety Scanner
  • 29. BOTNET Criminals distribute malicious software that can turn your computer in to a bot also known as zombie when it occurs it performs automated task over the internet. They use it to send out spam emails and messages. If this occurs to your computer then your computer will get slow down and you might be helping criminals.
  • 30. BOTNET PROTECTION  E-mail with malware as an attachment.  Drive-by malware.  Plug-in and application risks.  Hazard: data storage devices.
  • 31. BOTNET REMOVAL  Phrozensoft Mirage Anti-Bot.  Trend Micro RUBotted.  Norton Power Eraser.  BotHunter.  Avira BotFrei.
  • 32. BACKDOORS  A backdoors is a mean of access to a computer program that bypasses security mechanisms. Attacks:  Back door can be an installed program or could be a modification to an existing program. The installed program may allow a user log on to the computer without a password with administrative privileges. Many programs are available on internet to create back door attacks on systems. One of the more popular tools is Back Orifice which is also available for free download on internet.
  • 33. BACKDOORS PROTECTION  Profiling the website's traffic and comparing it against an extensive database of backdoors.  Enabling the detection to overcome file obfuscation and signature mutation.
  • 34. BACKDOORS REMOVAL  When AVG real-time antivirus protection detects a virus in your computer, the AVG Detection window is displayed, with two options:  Protect Me: this is the recommended action. It will remove the threat from your device.  Ignore the threat: will do nothing to remove the virus, however the file will be blocked so infection won't spread.  It is recommended to perform a full device scan after dealing with any threat, to make sure it was successfully deleted.
  • 35. SPYWARE Spyware is infiltration software that secretly monitors unsuspecting users. It can enable a hacker to obtain sensitive information, such as passwords, from the user's computer. Spyware exploits user and application vulnerabilities and is often attached to free online software downloads or to links that are clicked by users. Attacks: •Slow computer performance. • System instability . • New browser toolbars or menu. • New shortcuts. • Hijacked home page. • Increased pop-ups.
  • 36. SPYWARE PROTECTION  The use of system resources, including what programs are installed on their computers.  The collection,use,and distribution of personal or otherwise sensitive information.  Material changes that affect the user experience privacy, or system security.
  • 37. SPYWARE REMOVAL  Check Installed Programs for items that don't belong on your computer. Use this method with extreme caution. Control Panel lists many programs, most of which are not spyware.  Reinstall Windows. Some spyware can hide itself so well that it can't be removed.
  • 38. ROGUE SECURITY SOFTWARE  This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010.
  • 39. ATTACKS  Gives a false sense of security.  Fraudulent transaction.  Interrupts legitimate security program operations.  Prevents you from visiting legitimate security software vendor sites
  • 40. PROTECT  The best way to avoid rogues is to prevent them from being installed in the first place.  Another way you can protect yourself is to be wary. Legitimate security companies won’t try to scare you into using their scanners.
  • 41. REMOVE  Don’t pay the fee they ask for – this could create further problems and expose you to further fraud or identity theft.  If you have problems getting rid of a rogue the following article might help