create account

LearnTech : "Internet Threats (MALWARE)" by r5yn1r4

View this thread on: hive.blogpeakd.comecency.com
· @r5yn1r4 ·
$2.46
LearnTech : "Internet Threats (MALWARE)"
# <center>"Internet Threats (MALWARE)"</center>

The __Internet__ is defined as the *Information Highway*. It means that anyone has access to this highway, can place information, and can grab the information in different ways. Any information, even you set privately, can be access one way or another. And it is important that you aware what kind of possible threats their using.

<center>![]( https://steemitimages.com/450x650/https://images.techhive.com/images/article/2015/02/022315-detect-malware-1-100569092-primary.idge.jpg)</center>
<center>[Image Source](https://images.techhive.com/images/article/2015/02/022315-detect-malware-1-100569092-primary.idge.jpg)</center>

There are many Kind of Threats on the Internet, like; Botnets, Hacking, Malware, Pharming, Phishing, Ransomware, Spam and many more. But I just want to discuss the most  Common Threats on the Internet which is the Malware.

__Malware__ -  is short for *“malicious software”*. It is general term covering all the different types of threats to your computer safety such as a *virus, worm, trojan, spyware, adware* and so on.

__Here are some of the Malware threats you should be aware of using the internet:__

<div class="pull-right"><center><img src="https://static.makeuseof.com/wp-content/uploads/2015/03/virus-abstract.png" /><br/><em><a href="https://static.makeuseof.com/wp-content/uploads/2015/03/virus-abstract.png">Image Source</a></em></center></div>

   a. *Virus* - a malicious program designed to replicate itself and transfer from one computer to another either through internet and local network or data storage. Viruses consist of malicious code that infects a device after you install a software.

<div class="pull-left"><center><img src="https://sites.google.com/site/cybercrimeinfos/_/rsrc/1432038085100/home/types-of-cyber-crime/worm.jpg" /><br/><em><a href="https://sites.google.com/site/cybercrimeinfos/_/rsrc/1432038085100/home/types-of-cyber-crime/worm.jpg">Image Source</a></em></center></div>

   b. *Worms* - are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. One of the famous worm created is the *ILOVEYOU WORM*  (*Love Bug Worm*), was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 which this worm is created by a __FILIPINO__.

<div class="pull-right"><center><img src="https://s-media-cache-ak0.pinimg.com/originals/39/4d/9e/394d9ed9d61947e6c5e15401f7e3aee9.jpg" /><br/><em><a href="https://s-media-cache-ak0.pinimg.com/originals/39/4d/9e/394d9ed9d61947e6c5e15401f7e3aee9.jpg">Image Source</a></em></center></div>

   c. *Trojan* - a malicious program that is disguised as a useful program but one downloaded or installed, leaves your  PC unprotected and allows hackers to get your information.  There is a wide variety of Trojan on the Internet landscape that can perform an array of tasks.
* __Rogue security software__ - tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.

<div class="pull-left"><center><img src="https://s-media-cache-ak0.pinimg.com/originals/6b/62/2e/6b622e45473d5ab1352a41a82448064c.jpg" /><br/><em><a href="https://s-media-cache-ak0.pinimg.com/originals/6b/62/2e/6b622e45473d5ab1352a41a82448064c.jpg">Image Source</a></em></center></div>

d. *Spyware* - is a piece of malware that tricks you into installing it by piggybacking on a piece of desirable software or disguising itself as one. It is a program that runs in the background without you knowing it (thus called *"spy"*). It has the ability to monitor what you are currently doing and typing through *keylogging*.
* __Keyloggers__ - used to record the keystroke done by the user. This is done to steal their password or any other sensitive information.

<div class="pull-right"><center><img src="http://howtouninstallamalwares.com/wp-content/uploads/2016/09/adware-gen.jpg" /><br/><em><a href="http://howtouninstallamalwares.com/wp-content/uploads/2016/09/adware-gen.jpg">Image Source</a></em></center></div>


e. *Adware* -  is any software application in which advertising banners are displayed while a program is running. 
This program designed to send your advertisements, mostly as pop-ups. Adware is commonly created for computers, but may also be found on mobile devices.

> Source for some information - RBS Empowerment Technology Book.

# <center>😃Thank you for reading!😃</center>

<center>__If you have comments, opinions, reactions or corrections, please drop it off. I will surely appreciate it.__</center>

![](https://steemit-production-imageproxy-upload.s3.amazonaws.com/DQmegBvMTpBDPT4bZSgx8ASeL9KZHnKPjSpjKuLjVhuBmdw)
![Username.png](https://steemitimages.com/DQmS17vZdDhXZb1qQj6m4c5qBaeeasqkvLzJ7vr27GDsS3N/Username.png)
![](https://steemit-production-imageproxy-upload.s3.amazonaws.com/DQmegBvMTpBDPT4bZSgx8ASeL9KZHnKPjSpjKuLjVhuBmdw)
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 157 others
properties (23)
authorr5yn1r4
permlinklearntech-internet-threats-malware
categoryinternet
json_metadata{"tags":["internet","tutorial","threats","philippines","cebu"],"image":["https://steemitimages.com/450x650/https://images.techhive.com/images/article/2015/02/022315-detect-malware-1-100569092-primary.idge.jpg","https://static.makeuseof.com/wp-content/uploads/2015/03/virus-abstract.png","https://sites.google.com/site/cybercrimeinfos/_/rsrc/1432038085100/home/types-of-cyber-crime/worm.jpg","https://s-media-cache-ak0.pinimg.com/originals/39/4d/9e/394d9ed9d61947e6c5e15401f7e3aee9.jpg","https://s-media-cache-ak0.pinimg.com/originals/6b/62/2e/6b622e45473d5ab1352a41a82448064c.jpg","http://howtouninstallamalwares.com/wp-content/uploads/2016/09/adware-gen.jpg","https://steemit-production-imageproxy-upload.s3.amazonaws.com/DQmegBvMTpBDPT4bZSgx8ASeL9KZHnKPjSpjKuLjVhuBmdw","https://steemitimages.com/DQmS17vZdDhXZb1qQj6m4c5qBaeeasqkvLzJ7vr27GDsS3N/Username.png"],"links":["https://images.techhive.com/images/article/2015/02/022315-detect-malware-1-100569092-primary.idge.jpg","https://static.makeuseof.com/wp-content/uploads/2015/03/virus-abstract.png","https://sites.google.com/site/cybercrimeinfos/_/rsrc/1432038085100/home/types-of-cyber-crime/worm.jpg","https://s-media-cache-ak0.pinimg.com/originals/39/4d/9e/394d9ed9d61947e6c5e15401f7e3aee9.jpg","https://s-media-cache-ak0.pinimg.com/originals/6b/62/2e/6b622e45473d5ab1352a41a82448064c.jpg","http://howtouninstallamalwares.com/wp-content/uploads/2016/09/adware-gen.jpg"],"app":"steemit/0.1","format":"markdown"}
created2018-05-26 17:16:51
last_update2018-05-26 17:16:51
depth0
children3
last_payout2018-06-02 17:16:51
cashout_time1969-12-31 23:59:59
total_payout_value1.937 HBD
curator_payout_value0.519 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length5,139
author_reputation327,441,731,886
root_title"LearnTech : "Internet Threats (MALWARE)""
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id57,829,951
net_rshares635,872,445,148
author_curate_reward""
vote details (221)
@sneaky-ninja ·
re-r5yn1r4-learntech-internet-threats-malware-20180527t054446481z
![sneaky-ninja-sword-xs.jpg](https://steemitimages.com/DQmde7XXhkKjmxyqBbBPTwkaiuXXrtQe6qXoWmCDZL1nD2B/sneaky-ninja-sword-xs.jpg)
Sneaky Ninja Attack! You have just been defended with a 2.07% upvote!
I was summoned by @r5yn1r4. I have done their bidding and now I will vanish...

woosh
A portion of the proceeds from your bid was used in support of youarehope and tarc.

[Abuse Policy]( https://steemit.com/steemit/@sneaky-ninja/new-sneaky-ninja-abuse-policy-must-read-for-all-users)
[Rules]( https://steemit.com/steemit/@sneaky-ninja/sneaky-ninja-reminder-of-rules)
[How to use Sneaky Ninja]( https://steemit.com/steemit/@sneaky-ninja/reminder-how-to-use-sneaky-ninja)
[How it works]( https://steemit.com/steemit/@sneaky-ninja/sneaky-ninja-reminder-of-how-he-works-vote-worth-usd160-now)
[Victim of grumpycat?](https://steemit.com/we-resist/@firedream/resistance-started)
properties (22)
authorsneaky-ninja
permlinkre-r5yn1r4-learntech-internet-threats-malware-20180527t054446481z
categoryinternet
json_metadata{"app":"postpromoter/2.0.0"}
created2018-05-27 05:44:45
last_update2018-05-27 05:44:45
depth1
children0
last_payout2018-06-03 05:44:45
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length873
author_reputation6,929,108,306,933
root_title"LearnTech : "Internet Threats (MALWARE)""
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id57,901,797
net_rshares0
@steemitboard ·
Congratulations @r5yn1r4! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

[![](https://steemitimages.com/70x80/http://steemitboard.com/notifications/firstpayout.png)](http://steemitboard.com/@r5yn1r4) You got your First payout

Click on any badge to view your Board of Honor.

To support your work, I also upvoted your post!
For more information about SteemitBoard, click [here](https://steemit.com/@steemitboard)

If you no longer want to receive notifications, reply to this comment with the word `STOP`

**Do not miss the [last announcement](https://steemit.com/steemitboard/@steemitboard/steemitboard-new-level-notifications) from @steemitboard!**

> Do you like **SteemitBoard**'s project? **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**!
properties (22)
authorsteemitboard
permlinksteemitboard-notify-r5yn1r4-20180526t215620000z
categoryinternet
json_metadata{"image":["https://steemitboard.com/img/notify.png"]}
created2018-05-26 21:56:18
last_update2018-05-26 21:56:18
depth1
children1
last_payout2018-06-02 21:56:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length878
author_reputation38,975,615,169,260
root_title"LearnTech : "Internet Threats (MALWARE)""
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id57,861,563
net_rshares0
@r5yn1r4 ·
Thank you so much @steemitboard
properties (22)
authorr5yn1r4
permlinkre-steemitboard-steemitboard-notify-r5yn1r4-20180527t044215832z
categoryinternet
json_metadata{"tags":["internet"],"users":["steemitboard"],"app":"steemit/0.1"}
created2018-05-27 04:42:33
last_update2018-05-27 04:42:33
depth2
children0
last_payout2018-06-03 04:42:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length31
author_reputation327,441,731,886
root_title"LearnTech : "Internet Threats (MALWARE)""
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id57,896,657
net_rshares0