Malware 101 - Core Networks

Telcom and Cyber Security Blog

Malware 101

Jun 25, 2018 | Cyber Security

In our previous post we discussed the Russian malware known as VPNFilter.  In this post, we figured we should pull back a little and give you a rundown on malware in general.  You’ve probably heard lots of terms associated with malware – viruses, rootkits, Trojans, etc, – but maybe you don’t understand how they’re related.  We’ll try to clear that up.

malware 101

Secure your business with CORE Networks

Malware is a broad, umbrella term that means “malicious software.”  It basically encompasses all software created will malicious intent, whether it be as simple as making an annoying image pop up on your computer, or as nefarious as trying to sabotage national infrastructure.  Malware covers a very broad range of methods and goals, so we’ll look at some of the most common ones.

Virus = One of the most common terms, a computer virus functions somewhat similarly to a biological virus.  It gets into a host – your computer – and then uses the host’s resources – files and other programs – to replicate.  They can then steal data, email copies of themselves to your contacts, and more.

Worm = Worms are similar to viruses, except they do not require a specific host.  Instead, a worm can duplicate itself while it floats around in your network. Because this is one of the few distinctions between viruses and worms, the two terms are often used interchangeably.

Trojans = Trojans get their name from their delivery method.  They present themselves as an innocent program or another piece of software, and may even perform some sort of innocuous function on the surface, but the ultimate, ulterior motive of a Trojan is malicious.  Mercifully, one other trait of Trojans is that they do not duplicate themselves, so they do not spread quite as easily.

These are but three of the major types of malware.  There are many other forms of malware, and perhaps will cover them in more depth later, but for now, we want to give you a little knowledge on defending against them. Fleas make for a good comparison to malware. Once fleas get in your house, they can multiply like crazy, become a considerable nuisance, and prove difficult to get rid of.  The same is true of malware. When possible, it is best to prevent the malware from entering in the first place.

Common entry methods for malware:

– Clicking on ads

– Opening email attachments

– Downloading files from the internet

– Connecting an infected device like a USB drive to your computer

Everyone – especially those that are not tech-savvy – should have some form of anti-virus/anti-malware program on their computer.  And you must make sure that those programs are kept updated! Anti-malware programs work by scanning your computer and comparing what it finds to a database of known malware to see if it finds a match.  New malware is created every day, so you have to make sure your anti-malware program is updating its database.  And if this all seems confusing to you, call us or drop us a message and we’ll do it for you.

Trusted Business
corenets.com
This site has obtained the following certificates:
Reviews credibility
Certified

Customer reviews showcase the level and quality of service a website provides.

Trustindex collaborates with 131 review platforms to provide website visitors easy access to all real and verified reviews in one place.

Reviews from other platforms are displayed and added to the ratings only if they are proven spam-free and meet Trustindex's guidelines.

99% issue-free services
Certified

Trustindex continuously measures the satisfaction of your customers based on evaluations. Less than 1% of the customers surveyed indicated a problem.

Verified business
Certified

The website's contact information and business information has been independently verified by Trustindex.

Contact details
Phone:
+1 985-624-9970
Verified
E-mail:
Verified
Business data
Company name:
Core Networks | Managed Services & Cyber Security
Domain:
corenets.com
Company founded:
2002
Number of employees:
2-10
Start of Trustindex verification:
2024-04-29
Data protection
Certified

The website is constantly checked for security issues by Trustindex.

Safe Browsing: no problems detected
Blacklist
Not a Blacklisted Site
Valid SSL certificate
Spam
E-mail is spam-free
About Trustindex certificate

Websites that continuously maintain a high level of customer satisfaction and comply with a high level of security protocol can obtain a Trustindex certificate. When shopping, look for Trustindex certificates and buy with confidence.
More details »

For businesses
Build trust and increase sales with Trustindex certification.
More details »