Malware (a portmanteau of malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network...
76 KB (7,584 words) - 05:00, 14 November 2024
multiple times over its history by intentionally harmful software. Known as malware, these pose particular challenges both to users of the platform as well...
8 KB (854 words) - 00:02, 2 April 2024
Antivirus software (redirect from Malware scanner)
(abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed...
99 KB (9,149 words) - 19:35, 5 November 2024
Cyberattack (redirect from Malware campaign)
exploit them and create malware to carry out their goals, and deliver it to the targeted system. Once installed, the malware can have a variety of effects...
38 KB (4,656 words) - 17:19, 25 November 2024
Ransomware (redirect from Ransomware (malware))
Ransomware is a type of malware that permanently blocks access to the victim's personal data unless a "ransom" is paid. While some simple ransomware may...
105 KB (10,779 words) - 19:36, 2 November 2024
Malwarebytes (software) (redirect from Malwarebytes' AntiMalware)
Anti-Malware, abbreviated as MBAM) is anti-malware software for Microsoft Windows, macOS, ChromeOS, Android, and iOS that finds and removes malware. Made...
9 KB (673 words) - 00:59, 19 November 2024
Stuxnet (redirect from Stuxnet (malware))
irregular for malware. The Windows component of the malware is promiscuous in that it spreads relatively quickly and indiscriminately. The malware has both...
138 KB (11,938 words) - 01:41, 14 November 2024
Mirai (from the Japanese word for "future", 未来) is malware that turns networked devices running Linux into remotely controlled bots that can be used as...
39 KB (3,448 words) - 22:39, 3 November 2024
Trojan horse (computing) (redirect from Trojan (malware))
In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The...
20 KB (2,045 words) - 13:35, 22 November 2024
Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm...
6 KB (622 words) - 03:24, 15 April 2023
Malwarebytes (redirect from MalwareBytes)
specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater...
28 KB (2,864 words) - 07:12, 1 October 2024
Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows...
33 KB (2,741 words) - 11:10, 6 November 2024
Kaspersky Lab (section Malware discovery)
tests | Anti-Malware Test Lab". Anti-malware-test.com. Archived from the original on April 19, 2021. Retrieved March 8, 2012. "Anti-Malware Solutions Test...
76 KB (6,948 words) - 15:19, 12 November 2024
Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like...
57 KB (4,822 words) - 00:44, 14 November 2024
Computer security (redirect from Economic impact of malware)
tools to defend the business." SMBs are most likely to be affected by malware, ransomware, phishing, man-in-the-middle attacks, and Denial-of Service...
222 KB (22,533 words) - 02:59, 25 November 2024
and worms Palm OS viruses HyperCard viruses Linux malware Conficker Creeper virus - The first malware that ran on ARPANET ILOVEYOU Leap - Mac OS X Trojan...
17 KB (423 words) - 20:11, 5 October 2024
IObit Malware Fighter (introduced in 2004) is an anti-malware and anti-virus program for the Microsoft Windows operating system (Windows XP and later)...
9 KB (775 words) - 17:09, 20 October 2024
Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser...
13 KB (1,141 words) - 08:10, 8 September 2024
WannaCry ransomware attack (redirect from WannaCry malware)
CVE-2017-0144 exploit on unpatched systems. When executed, the WannaCry malware first checks the kill switch domain name (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea...
113 KB (8,617 words) - 17:24, 25 October 2024
Adware (redirect from Adware (malware))
displays advertisements when the user browses the Internet", i.e., a form of malware. Some developers offer software free of charge and rely on advertising...
22 KB (2,252 words) - 19:16, 20 October 2024
Zero-day vulnerability (redirect from Next-generation malware)
ineffective against the malware introduced by zero-day exploits. Security systems are designed around known vulnerabilities, and malware inserted by a zero-day...
18 KB (2,404 words) - 13:51, 27 August 2024
SpyEye (redirect from SpyEye (malware))
SpyEye is a malware program that attacks users running Google Chrome, Safari, Opera, Firefox and Internet Explorer on Microsoft Windows operating systems...
8 KB (839 words) - 14:23, 28 October 2024
Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the...
20 KB (2,241 words) - 19:19, 2 July 2024
Rootkit (redirect from Stealth malware)
term "rootkit" has negative connotations through its association with malware. Rootkit installation can be automated, or an attacker can install it after...
69 KB (7,095 words) - 13:31, 9 August 2024
is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware. The site was launched in May, 2019...
3 KB (248 words) - 00:26, 2 November 2024
Fireball (software) (redirect from Fireball (malware))
have discovered Fireball malware in 2017 but Microsoft claims that it has been tracking the malware since 2015. The malware has been tracked to a Chinese...
7 KB (762 words) - 04:23, 9 March 2023
horse that has been designed to install malware (such as viruses and backdoors) onto a computer. The malware within the dropper can be packaged to evade...
4 KB (367 words) - 14:31, 3 June 2024
MISP Threat Sharing (redirect from Malware Information Sharing Platform)
MISP Threat Sharing (MISP), Malware Information Sharing Platform is an open source threat intelligence platform. The project develops utilities and documentation...
7 KB (644 words) - 10:59, 4 June 2024
Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. It does...
14 KB (1,472 words) - 17:21, 12 September 2024