Computer Virus Information-stay ahead

Computers’ virus is evolving very quickly. Technology is also changing at an exponential rate, with new software and systems, emerging constantly. Every industry has received a technical upgrade to some degree.
Similarly, the makers of so-called malware must keep updating their “products” in order to escape antivirus software. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data
What does a computer virus do to your system? to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Every now and then New Viruses are there. We will keep you updated with every type of virus.
Divider

Malware

VIRUS-Resident,Non-Resident,
Multipartite,Direct Action,
Overwrite,Web Scripting,Boot Sector,Macro,Directory,Polymorphic,
File Infector,Encrypted,
Network,Stealth,
Sparse,Spacefiller,
FAT

Malware

Ransomware-Locker Ransomware
Crypto Ransomware
Bitcryptor and CoinVault
TorrentLocker
CTB-Locker
TeslaCrypt
Locky

Malware

Trojan-Backdoor,Exploit,Rootkit
Banker,DdoS,Downloader
Dropper,GameThief,Ransom
SMS,Spy
Mailfinder

Malware

Worm-Instant Messaging,
File-sharing Networks,
Internet, Email,
IRC

Malware

Hardware Keyloggers,
Acoustic Keyloggers
API-Based Keyloggers,
Kernel-Based Keyloggers
Spyware
Adware

  • Malware

    VIRUS-Resident,Non-Resident,
    Multipartite,Direct Action,
    Overwrite,Web Scripting,Boot Sector,Macro,Directory,Polymorphic,
    File Infector,Encrypted,
    Network,Stealth,
    Sparse,Spacefiller,
    FAT

  • Malware

    Ransomware-Locker Ransomware
    Crypto Ransomware
    Bitcryptor and CoinVault
    TorrentLocker
    CTB-Locker
    TeslaCrypt
    Locky

  • Malware

    Trojan-Backdoor,Exploit,Rootkit
    Banker,DdoS,Downloader
    Dropper,GameThief,Ransom
    SMS,Spy
    Mailfinder

  • Malware

    Worm-Instant Messaging,
    File-sharing Networks,
    Internet, Email,
    IRC

  • Malware

    Hardware Keyloggers,
    Acoustic Keyloggers
    API-Based Keyloggers,
    Kernel-Based Keyloggers
    Spyware
    Adware

Tpye of Cyber Attacks

What is Cyber Attack A cyber attack is any type of offensive

What is Direct Action Virus

Direct Action Virus Direct action viruses attack certain kind of

What is overwrite virus

Overwriting Virus explained An overwriting virus ( overwriting infector) is

What is multipartite virus

Understanding multipartite virus Before going forward we should understand about

What is Resident virus

What is Resident virus A resident virus hides and stores

What is non-resident virus

What is Non-Resident Virus A non-resident virus is a computer virus that

What is sparse infector

Sparse infector-logic dependence viruses Sparse infectors use distinct strategies to

What is spacefiller virus

What is Spacefiller virus A spacefiller virus also called cavity

coronavirus pandemic

How India is reacting to the coronavirus pandemic Despite being

What is Resident Virus

Resident Virus The virus will normally infect an executable file

What is Polymorphic viruses

Polymorphic Virus When unknown advertisements are popping up on the

What is Macro Virus

What is Macro Virus ? A macro virus is a

Divider

Tech Terms

Most frequently takled

It is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device’s processor.RAM is a volatile memory.

This is a hardware medium in computer device that permanently stores data on computer. It contains the programming needed to start a computer, which is essential for boot-up.ROM is not volatile memory

non-resident virus is a computer virus that does not install itself in the computer memory.

A resident virus installs itself somewhere in the random access memory (RAM) in the computer.

The term “sparse infector” is sometimes used to describe a virus that infects only occasionally (e.g. every tenth program executed), or only
files whose lengths fall within a narrow range, etc.

The system infector viruses infect the various parts of the operating system or master program software. This virus prevents the computer from booting.

It is process of Identification Entering bank card and pin into bank machine is Authentication process

It is the process of verifying rights to access resources.Authorization usually comes after authentication

These are most common type of headphones,which sits in the ear canal.

These headphones sits outside the outer ear and are poor in noise isolation

Riskware is the name given to legitimate programs that can cause damage if they are exploited by malicious users

Pornware is the name given to a class of programs that display pornographic material on a device

AC outlet which brings current from far off grids/wires to your house/office

The lamp cord which allows to flow the cureent to your lamp and supply current for light.Only in wifi it is wireless

Macs and iPads are immune to catching viruses (and don’t need an antivirus). For the most part, that’s true. At the very least, it hasn’t happened in a long time.

Do windows get malware ?

There isn’t one clear reason why Windows has the most viruses of any operating system.The latest versions of Windows are much more secure but windows still remains a target.

computer virus is an application that needs to be downloaded or otherwise transferred onto the host computer before the infection can take place

A computer worm is an application that accesses a computer over a network.It doesn’t require the user to download or open any host application.

Virus vs Trojan

A computer virus is a small program written to alter the way a computer operates, without the permission of the user.It can execute and replicate itself.

they do not replicate themselves like virus.  Trojan horse  spread through attachment

There have been viruses that have been designed to physically damage computers or hardware equipment connected to computers. One of the most notable viruses capable of damaging hardware is Stuxnet, which was designed to target industrial equipment, like nuclear reactors.

Where Computer Virus can not infect ?

A computer virus cannot infect a CD or DVD, as most CDs or DVDs are locked after being created, preventing additional files from being put on that disc. However, if during the creation of the disc a virus is also copied to the disc it would become infected.