Malware, or malicious software, is computer code designed to disrupt, disable or take control of your computer system. It comes in many forms, usually hidden in another file or disguised as a harmless app. It works by taking advantage of technical flows or vulnerabilities in your hardware OS and software. Malware comes in many forms. Ransomware locks infected systems until the victim pays a ransom to unlock it. Credential Stealers are used to get usernames and passwords for email and other accounts.
Banking Trojans are more specific, targeting your banking usernames and passwords. Key Loggers can record your keystrokes to get passwords, account numbers and more. Attackers can use a set of software tools called Rootkits to get control of your systems. With a Cryptocurrency Miner an attacker can takeover your computer to generate cryptocurrency, like Bitcoin. If you unwittingly install a Botnet your computer can become part of a network of injected systems used to send spam and launch large scale attacks. To activate most malware requires a key ingredient, people. Attackers must find ways to trick people into running a malicious file, opening an infected file or clicking an unsafe web link. That’s why stopping malware starts with people, learn how to protect them at proofpoint.com.