Worms are also from the category of viruses, but have their own peculiarities: files, the worm code is independent, it is introduced once into a computer and looks for ways to spread further to other computers.
Trojan program – looks like a legitimate software product, but when launched it performs malicious actions, these programs cannot spread by themselves and are written specifically to perform some malicious function.
A rootkit is a set of programs that
Are used to hide their presence in the system when attempting to access the computer without automation.
A DoS (DDoS) attack is a network attack that is carried out with the purpose of disrupting or hindering the operation of a server or other network resource.
Phishing is a type of cyber fraud aimed at revealing your personal data, usually of a financial nature.
Drive-by download , the computer engineer database becomes infected when visiting a website that contains malicious code. Cybercriminals look for websites that are vulnerable to hacking and enter malicious code into the pages of the site. Therefore, if you do not have a fresh version of the antivirus, the code is downloaded to your computer.
A keylogger is a program that
Tracks the keys you press on your keyboard, allowing attackers to gain access to confidential data.
Adware is a program infect other that launches advertising, which can be pop-up windows or redirection of your search queries.
Adware, which is usually free or shareware programs that you download to your computer, may also contain a Trojan program. Often this is downloaded from torrents, then various windows pop up that are difficult to get rid of.
Therefore, it is necessary to use the most common mistake of online sellers the latest versions of web browsers, because agb directory they can be vulnerable, the settings infect other can change, which can sometimes redirect you to paid websites, often such sites can be (pornographic)
Botnets or infect other botnets . Botnets are created by Trojan programs and controlled by the owner, who then gains access to the infected computers.