Malware

Malware is short for malicious software and is used as a catch-all term to refer to any software that causes damage to a computer, server, or computer network. Malware on your computer could lead to:

  • theft of personal information
  • spam being sent to other computer users worldwide
  • your computer running more slowly
  • your computer crashing more often and taking longer to start up
  • the use of valuable computer memory and hard disk space
  • the alteration of your computer's settings from what the manufacturer intended

While many of these dangers can render a computer or the data on it useless, there are ways to mitigate the damage, and in many cases to stop the attack before it becomes a problem.

Types of Malware

Viruses

A malicious program that usually requires some action on the part of a user in order to infect a computer; for example, opening an infected attachment or clicking on a link in a rigged email may trigger a virus to infect your computer.

Worms

Self-replicating malware that, for instance, hunts down unprotected computers and recruits them for criminal or other malicious purposes. Unlike a virus, worms do not require any action on your part in order to infect your computer.

Trojan Horses

A Trojan horse, in software terms, refers to a malicious piece of software that is hidden inside an apparently useful and innocent application. Users systems generally become infected by trojan horses when they install software or a fake "patch" from an Internet download or an email attachment.

Spyware

Spyware and adware are small software programs that get stored on your computer without your permission, usually when you visit a website, sign up for "free" mailings, or download "free" software. These programs Data Mine, or gather information about your computer use, web browsing, online purchasing and send it to sites that may sell it to others.

Rootkits

Rootkits are designed to give an attacker "root" or administrative access to a victim's computer. With root access, an attacker can perform a variety of tasks on the computer including browsing the infected computer's hard drive, making new user accounts or changing existing ones, or even using the computer's network connection for nefarious purposes.

Preventive Strategies

  • Install antivirus software - All computers connecting to the K-State network must have antivirus software installed. Learn what's recommended: antivirus.k-state.edu.
  • Install critical software updates - Microsoft Windows Update for PCs Apple Support Downloads for Mac.
  • Install anti-spyware software and ensure that it is kept up-to-date.
  • Be cautious of email attachments - never open unexpected attachments.