Technology has of course made our life smoother and better but with every new development in technology there also develops a new technology to infect them. Hackers to meet out their vested interests are finding out new and smarter ways. The growth in new and more powerful Malwares is increasing day by day with newer form coming out from every nook and corner of the dark world.
Now, what is a Malware?
Malware is the short for malicious software. It is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.
For Your Help:
Here are 10 of the most common malwares and their preventions as compiled by Norton.com:
Contents
VIRUS

Prevention:
* Make use of anti-virus software and keep it updated
* Avoid visiting unknown sites and never follow random links
* Access your emails through trusted sources
* Have a backup of your data in remote media such as CDs/DVDs
* Keep up to date on new virus techniques
SPAM

Prevention:
* Try to install spam blocking software and keep it updated
* Do not respond to spam mails
* Never click on URL links within IM if they are not from a known source
* Cancel all instant messages from unknown source
SPYWARE
Prevention:
* Use popular anti-spyware programs like Spybot – Search & Destroy, PC Tools’ Spyware Doctor Symantec, McAfee, and Zone Alarm, these programs acts as anti-virus software and scan all incoming network traffic and block threats that are detected
* Do daily, weekly, or monthly scans of your system to detect and eliminate any spyware that are being installed
* Configure the firewall in the internet security program to avoid unwanted requests for outbound communication
SPOOFING, PHISHING AND PHARMING
Phishing is another kind of spoofing where a fake website is created that just appears as a legal websites. This fake websites are under the control of the hacker and they can collect your credit card details, passwords, names, and other sensitive information. Phishing is mainly done through email or instant message. Some email claims to be from a legal source but when you click on the given link, you will enter into the fake web page.
Pharming is an attack in which an attacker redirects website’s traffic to another phony website. Pharming can be done either through changing the hosts file on a victim’s system or through exploitation of vulnerability in DNS server software.
Prevention:
* As spoofing, phishing, and pharming depend on tricking users rather than advanced technology, the best way to deal the threat is through vigilance
* Never access emails from unknown sources or click on links embedded in suspect messages
* Check out the security guidelines of websites such as PayPal to get an awareness of legitimate and fake emails
WORM

Prevention:
* As worms multiply by exploiting vulnerabilities in operating systems, computers should be updated with security software or patches
* Keep anti-virus and anti-spyware software updated
* Users should not open emails from unknown sources and never run attached programs or files or visit the sites that are related to such emails
ADWARE

Prevention:
* Make use of anti-spyware programs like Spybot – Search & Destroy
* Keep your anti-virus software or patches updated
BOTNET
Prevention:
* Security measures such as FireEye, Simplicita, Damballa, Symantec, and Trend Micro can be used to prevent botnets.
* Keep the anti-virus software updated
TROJAN HORSE

Prevention:
* Use anti-virus software to detect and remove Trojan horse automatically
KEYLOGGING
Prevention:
* Use anti-keylogging software such as ‘signature’ to detect and remove keyloggers
* Users should be aware of the programs that are installed on their system
* Use network monitors so that the users get alerted whenever an application tries to make a network connection.
DENIAL-OF-SERVICE ATTACK

Prevention:
* Assign a separate emergency block of IP addresses for the servers
* Routers and Switches can be configured to cut off traffic and avoid the DoS attack.
* Intrusion-prevention systems are efficient when the attacks have signatures linked with them.
Learn from real practitioners not just trainers.