...
width | 25% |
---|
...
id | 6 |
---|
Table of Contents
Column |
---|
OverviewMalware is an umbrella term for various types of malicious software. This term encompasses Viruses, Worms, Trojans, Adware, and more. Common symptoms of a malware infection include slow computer performance; difficulty registering or accessing the network; the inability to run software updates or anti-virus software, and unexplained pop-up warnings, errors, or ads. This article will review some basic information about various types of malware, how to recognize it, and what to do about it. Student-owned computers suspected of having any kind of malware infection can be dropped off free of charge at the ITS Helpdesk from 8 am–5 pm Monday–Friday. |
Types of Malware
Virus
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
What does it do?
How does it spread?
|
Trojan
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
What does it do?
How does it spread?
|
Worm
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
What does it do?
How does it spread?
|
Adware
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
What does it do?
How does it spread?
|
Spyware
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
How it spreads?
What it does?
|
Rootkit
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
How it spreads?
What does it do?
|
BotNet
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
How it spreads?
What does it do?
|
Phishing
...
Column | ||
---|---|---|
| ||
Column |
---|
What is it?
How?
What does it do?
|
Vectors to Infection
The following are just some examples of the most common methods by which machines or accounts can be compromised.
Panelbox | ||
---|---|---|
| ||
Bad or suspicious links, especially in HTML email, what a link says might not be where it’s actually going. Dangerous attachments: Attachments can contain the malware itself, which might or might not be caught by antivirus tools. As a rule of thumb, don’t open one unless you know exactly who sent it and what it contains. Phishing: Tricking a user into giving away personal or financial information |
Software Vulnerabilities
Panelbox | ||
---|---|---|
| ||
Out of date software: may have vulnerabilities which can be exploited. Be sure to apply all patches and updates. Browser plugins: are popular targets because they are easy to install and often don’t get updated. Operating system: are the primary line of attach for malware developers. Run security patches and updates regularly. |
Malicious or Compromised Websites
Panelbox | ||
---|---|---|
| ||
Legitimate websites can contain dangerous links or harmful code:
Search engines: can be tricked or "seeded" with malicious sites Some attacks can happen without any interaction from you:
|
Tips to Help Avoid Infections
Warning | ||
---|---|---|
| ||
While it is true that there are far fewer infections for Mac computers, Macs are not invulnerable and can be infected. In addition, infected files may be transferred via Mac as, for example, email attachments. Don't assume you don't need to be protected or be careful just because you're on a Mac! |
It's nearly impossible to guarantee a way to avoid infections, but here are some good things to keep in mind:
Have active and up-to-date anti-malware software: Anti-malware software is important in keeping your personal machine safe and usable. We believe that the default anti-virus programs on personal machines, Windows Defender and macOS built in defenses, are sufficient at keeping your laptop clean. A helpful addition would be to download a free scanning software, such as Malwarebytes, to run a full scan of your machine every week. We believe those two things in tandem should keep your computer virus free.
There are more extensive, all-in-one tools which you can purchase, often on a subscription model. If you choose such a tool, you must ensure that you keep the subscription up-to-date. If you don't, the software will stop updating itself and will be unable to detect the most recent malware releases and variations.
Pause and consider links and downloads before clicking and installing: Even trusted sources sometimes get hacked and can provide infected content. Take a moment and think about how likely it is that the action you're about to take will be safe—were you expecting that attachment? Do you really need that software to do what you're doing?
Be suspicious of very scary warning messages: They're almost always malware themselves, especially if you have to click or install something to further scan your computer.
Ask questions: If you're not sure about something, and don't know how to proceed, stop by the ITS Helpdesk or give us a call at 507-222-5999, and we will help you out.
For Help
If your computer is infected and you're not able to remove the malware, you can:
- For a Carleton-owned or student-owned computer, bring it to the ITS Helpdesk (x5999).
- For all other devices, contact a local computer repair service.
...
Note |
---|
This page has been moved. See this page in our new Knowledge Base: Malware |