02-21-2018 , 04:10 AM
https://www.avira.com/en/security-term/t...tion/id/19 In-the-cloud detection
What is in-the-cloud detection?
This is a type of scanning, which takes place in the cloud: the digital fingerprint of unknown files are uploaded anonymously and scanned in real time.
The Avira Protection Cloud leverages this groundbreaking technology, and acts as our early warning system, whereby unknown files are scanned and the results are quickly distributed to our entire user base.
In-the-cloud detection gets more powerful with every user, increasing its ability to quickly disseminate information on new malware outbreaks, which is why we integrate it in Avira Free Antivirus as well as our premium products. : https://www.avira.com/en/security-term/t/malware/id/21 Malware
What is malware?
Malware is a Portmanteau term comprised of “malicious” and “software.” Although frequently used interchangeably with “virus,” it encompasses a much broader range of threats, including adware, keyloggers, rootkits, spyware, Trojans, viruses, and worms.
How to block malware
Avira Free Antivirus offers award-winning protection against malware. : https://www.avira.com/en/security-term/t/trojan/id/34 Trojan
What is a Trojan?
Trojans are malicious programs that misrepresent themselves to appear routine or helpful, but actually carry out hidden functions.
How Trojans spread
Trojans frequently spread via email, pirated software applications, license key generators (Photoshop is a grand favorite), drive-by downloads, and phishing attacks. One of the most dangerous Trojans was Zeus, a banking Trojan, which stole confidential banking information. Zeus spread on both computers and mobile devices, and was reported to have infected millions of users and stolen millions more from private and corporate banking accounts. Trojans also frequently install backdoors that allow computers to be remotely controlled, either directly or as part of a botnet.
Known cases
The Zeus Trojan was one of the most successful malware created, having stolen approximately 47 million dollars. Other notable cases include Shedun, which at its height, infected approximately 2000 users per day, and Tiny Banker Trojan, which as its name suggests, is one of the smallest Trojans ever created and therefore difficult to detect.
How to block Trojans
To guard against Trojans, we recommend being vigilant as to what email attachments you open and what web links you click on. And of course, Avira Free Antivirus protects you from Trojans. : https://www.avira.com/en/security-term/t/virus/id/35
Virus
What is a virus?
Computer viruses are self-reproducing malicious software that wreak havoc on devices and spread from one file to another, then one device to another, frequently via email attachments, drive-by-downloads, and USB drives. Viruses need human action to spread.
What they are after
Most viruses attach themselves to executable files, but on occasion, they also affect MS Office macros, auto-run scripts, and the master boot record. Viruses are largely disruptive in nature: they display irritating messages, disrupt the functioning of a device, corrupt files, or delete them altogether. In certain cases, viruses can also steal information.
Known cases
The Concept Virus that was accidentally shipped on a CD-ROM by Microsoft in 1995.
Chernobyl virus used to strike every year on April 26, marking the anniversary of the Chernobyl nuclear accident.
The Melissa virus, which spread via email and allegedly caused $80 million in damage.
How to block viruses
Avira Free Antivirus protects you from viruses. : https://www.avira.com/en/security-term/t/spyware/id/32 Spyware
What is spyware?
Spyware is software that secretly monitors and collects information.
Spyware can be used legally. Certain companies install it on their employees’ computers to monitor sensitive activities (in which case, it ought to be included in their contracts). It is also included in some parental control programs, which can work in a similar fashion to keep a watchful eye out for cyberbullying.
What it is after
In most cases, however, spyware is used to steal credit card details or passwords for banking websites and serial numbers.
How to block spyware
Avira Free Antivirus protects its users from spyware. : https://www.avira.com/en/security-term/t/rootkit/id/26 Rootkit
What are rootkits?
It’s a technique used by software to gain long-term access to a computer without having the required permission. Rootkits are typically installed by other malware to cover their traces. For example, a keylogger might siphon off passwords and credit card details, while the rootkit hides the traffic to keep the theft unbeknown to the user. Other cases involve Trojans that install a rootkit in order to create a botnet.
Known cases
Companies such as Sony have been known to use rootkits to track the spread of CDs online.
How to block rootkits
Most antivirus software detects and blocks rootkits. You can learn more about and download Avira Free Antivirus here. : https://www.avira.com/en/security-term/t/worm/id/38 Worm
What is a computer worm?
Worms are malicious programs similar to viruses: they cause havoc on devices and are able to self-replicate.
What they are after
Unlike viruses, which need human action to propagate, worms are able to send out hundreds of thousands of copies of themselves via email, or spread via USB devices and shared folders.
Known cases
Some of the most high-profile cases of worms include:
ILOVEYOU, which spread via email and caused businesses over 5.5 billion dollars in damage
Stuxnet, which attacked Iranian nuclear centrifuges, and was spread via USB devices
SQL Slammer, which slowed down the Internet for a brief period of time by attacking Internet hosts
Blaster worm, which forced computers to repeatedly and automatically reboot
How to block worms
Avira Free Antivirus protects its users from worms. : https://www.avira.com/en/security-term/t...tion/id/24
Potentially unwanted application (PUA)
What are potentially unwanted applications (PUAs)?
These are hidden applications, unknowingly downloaded alongside legitimate apps, which clutter your PC with ads, hijack your browsers, slow down your PC – and frequently collect data on what you click on.
How they spread
PUAs often get onto user’s PCs via social engineering tactics; legitimate applications trick the user to install additional software.
This tend to be done via:
Writing up a misleading description of the software
Claiming that the installation of additional software is mandatory
Installing additional software by default
Tricking the user into taking unnecessary actions
What they are after
PUAs can be extremely irritating. Among other things, they can collect information about your surfing habits and then transmit it to third parties without notification or consent. They can also hijack browsers to change default settings (search engine and start page).
Known cases
Some of the most commonly encountered PUAs include OpenCandy, InstallCore, and Media Get.
How to block PUAs
To protect yourself from PUAs, consider the following guidelines:
When downloading any software/app, be on the lookout for any pre-checked option boxes.
When it comes to terms and conditions, always read at least the title above the fine print to ensure that the terms are for the specific program(s) you want to download.
Read through the information in the top navigation bar of an installation wizard to catch names of unwanted programs.
Avira Free Antivirus blocks PUAs – even if you didn’t read the terms and conditions! : https://www.avira.com/en/security-term/t...ware/id/25 Ransomware What is ransomware?
There are two types of ransomware: crypto-ransomware that encrypts files (rendering them unreadable), and screen-locking ransomware that locks the home screen. In both cases, the authors of malicious software demand a ransom from its victims to access the files and device.
How ransomware spreads
Ransomware is frequently spread via email: a cybercriminal sends an email with an attachment. The unsuspecting user opens the document (or java script file), which looks like gibberish. The document recommends enabling macros “if the data encoding is incorrect,” which, of course, it is by design. Enabling macros allows the ransomware to be secretly downloaded onto computers via a drive-by download.
What it is after
Crypto-ransomware then proceeds to encrypt all files it finds (images, videos, office files…). It even scrambles data on removable drives plugged in at the time. Now that all files are encrypted, the ransomware asks for payment in exchange for unscrambling them. Payment is frequently demanded in bitcoin and can cost up to several thousands of dollars. In the case of screen-locking ransomware, the malware locks the home screen – preventing users from accessing their devices – and similarly demands payment for regaining access.
Known cases
CryptoLocker, FBI Ransomware, and Locky are three cases of widespread ransomware that have infected millions of victims.
How to protect yourself from ransomware
We recommend you back up your data on a regular basis, so that if your data is ever encrypted, you still have access to them and you can wipe your hard drive if need be. To detect and block ransomware, use security software such as Avira Free Antivirus.
What is in-the-cloud detection?
This is a type of scanning, which takes place in the cloud: the digital fingerprint of unknown files are uploaded anonymously and scanned in real time.
The Avira Protection Cloud leverages this groundbreaking technology, and acts as our early warning system, whereby unknown files are scanned and the results are quickly distributed to our entire user base.
In-the-cloud detection gets more powerful with every user, increasing its ability to quickly disseminate information on new malware outbreaks, which is why we integrate it in Avira Free Antivirus as well as our premium products. : https://www.avira.com/en/security-term/t/malware/id/21 Malware
What is malware?
Malware is a Portmanteau term comprised of “malicious” and “software.” Although frequently used interchangeably with “virus,” it encompasses a much broader range of threats, including adware, keyloggers, rootkits, spyware, Trojans, viruses, and worms.
How to block malware
Avira Free Antivirus offers award-winning protection against malware. : https://www.avira.com/en/security-term/t/trojan/id/34 Trojan
What is a Trojan?
Trojans are malicious programs that misrepresent themselves to appear routine or helpful, but actually carry out hidden functions.
How Trojans spread
Trojans frequently spread via email, pirated software applications, license key generators (Photoshop is a grand favorite), drive-by downloads, and phishing attacks. One of the most dangerous Trojans was Zeus, a banking Trojan, which stole confidential banking information. Zeus spread on both computers and mobile devices, and was reported to have infected millions of users and stolen millions more from private and corporate banking accounts. Trojans also frequently install backdoors that allow computers to be remotely controlled, either directly or as part of a botnet.
Known cases
The Zeus Trojan was one of the most successful malware created, having stolen approximately 47 million dollars. Other notable cases include Shedun, which at its height, infected approximately 2000 users per day, and Tiny Banker Trojan, which as its name suggests, is one of the smallest Trojans ever created and therefore difficult to detect.
How to block Trojans
To guard against Trojans, we recommend being vigilant as to what email attachments you open and what web links you click on. And of course, Avira Free Antivirus protects you from Trojans. : https://www.avira.com/en/security-term/t/virus/id/35
Virus
What is a virus?
Computer viruses are self-reproducing malicious software that wreak havoc on devices and spread from one file to another, then one device to another, frequently via email attachments, drive-by-downloads, and USB drives. Viruses need human action to spread.
What they are after
Most viruses attach themselves to executable files, but on occasion, they also affect MS Office macros, auto-run scripts, and the master boot record. Viruses are largely disruptive in nature: they display irritating messages, disrupt the functioning of a device, corrupt files, or delete them altogether. In certain cases, viruses can also steal information.
Known cases
The Concept Virus that was accidentally shipped on a CD-ROM by Microsoft in 1995.
Chernobyl virus used to strike every year on April 26, marking the anniversary of the Chernobyl nuclear accident.
The Melissa virus, which spread via email and allegedly caused $80 million in damage.
How to block viruses
Avira Free Antivirus protects you from viruses. : https://www.avira.com/en/security-term/t/spyware/id/32 Spyware
What is spyware?
Spyware is software that secretly monitors and collects information.
Spyware can be used legally. Certain companies install it on their employees’ computers to monitor sensitive activities (in which case, it ought to be included in their contracts). It is also included in some parental control programs, which can work in a similar fashion to keep a watchful eye out for cyberbullying.
What it is after
In most cases, however, spyware is used to steal credit card details or passwords for banking websites and serial numbers.
How to block spyware
Avira Free Antivirus protects its users from spyware. : https://www.avira.com/en/security-term/t/rootkit/id/26 Rootkit
What are rootkits?
It’s a technique used by software to gain long-term access to a computer without having the required permission. Rootkits are typically installed by other malware to cover their traces. For example, a keylogger might siphon off passwords and credit card details, while the rootkit hides the traffic to keep the theft unbeknown to the user. Other cases involve Trojans that install a rootkit in order to create a botnet.
Known cases
Companies such as Sony have been known to use rootkits to track the spread of CDs online.
How to block rootkits
Most antivirus software detects and blocks rootkits. You can learn more about and download Avira Free Antivirus here. : https://www.avira.com/en/security-term/t/worm/id/38 Worm
What is a computer worm?
Worms are malicious programs similar to viruses: they cause havoc on devices and are able to self-replicate.
What they are after
Unlike viruses, which need human action to propagate, worms are able to send out hundreds of thousands of copies of themselves via email, or spread via USB devices and shared folders.
Known cases
Some of the most high-profile cases of worms include:
ILOVEYOU, which spread via email and caused businesses over 5.5 billion dollars in damage
Stuxnet, which attacked Iranian nuclear centrifuges, and was spread via USB devices
SQL Slammer, which slowed down the Internet for a brief period of time by attacking Internet hosts
Blaster worm, which forced computers to repeatedly and automatically reboot
How to block worms
Avira Free Antivirus protects its users from worms. : https://www.avira.com/en/security-term/t...tion/id/24
Potentially unwanted application (PUA)
What are potentially unwanted applications (PUAs)?
These are hidden applications, unknowingly downloaded alongside legitimate apps, which clutter your PC with ads, hijack your browsers, slow down your PC – and frequently collect data on what you click on.
How they spread
PUAs often get onto user’s PCs via social engineering tactics; legitimate applications trick the user to install additional software.
This tend to be done via:
Writing up a misleading description of the software
Claiming that the installation of additional software is mandatory
Installing additional software by default
Tricking the user into taking unnecessary actions
What they are after
PUAs can be extremely irritating. Among other things, they can collect information about your surfing habits and then transmit it to third parties without notification or consent. They can also hijack browsers to change default settings (search engine and start page).
Known cases
Some of the most commonly encountered PUAs include OpenCandy, InstallCore, and Media Get.
How to block PUAs
To protect yourself from PUAs, consider the following guidelines:
When downloading any software/app, be on the lookout for any pre-checked option boxes.
When it comes to terms and conditions, always read at least the title above the fine print to ensure that the terms are for the specific program(s) you want to download.
Read through the information in the top navigation bar of an installation wizard to catch names of unwanted programs.
Avira Free Antivirus blocks PUAs – even if you didn’t read the terms and conditions! : https://www.avira.com/en/security-term/t...ware/id/25 Ransomware What is ransomware?
There are two types of ransomware: crypto-ransomware that encrypts files (rendering them unreadable), and screen-locking ransomware that locks the home screen. In both cases, the authors of malicious software demand a ransom from its victims to access the files and device.
How ransomware spreads
Ransomware is frequently spread via email: a cybercriminal sends an email with an attachment. The unsuspecting user opens the document (or java script file), which looks like gibberish. The document recommends enabling macros “if the data encoding is incorrect,” which, of course, it is by design. Enabling macros allows the ransomware to be secretly downloaded onto computers via a drive-by download.
What it is after
Crypto-ransomware then proceeds to encrypt all files it finds (images, videos, office files…). It even scrambles data on removable drives plugged in at the time. Now that all files are encrypted, the ransomware asks for payment in exchange for unscrambling them. Payment is frequently demanded in bitcoin and can cost up to several thousands of dollars. In the case of screen-locking ransomware, the malware locks the home screen – preventing users from accessing their devices – and similarly demands payment for regaining access.
Known cases
CryptoLocker, FBI Ransomware, and Locky are three cases of widespread ransomware that have infected millions of victims.
How to protect yourself from ransomware
We recommend you back up your data on a regular basis, so that if your data is ever encrypted, you still have access to them and you can wipe your hard drive if need be. To detect and block ransomware, use security software such as Avira Free Antivirus.