Adware Explained
Adware are pieces of software that are often disguised as legitimate programs and can be installed on your computer without your knowledge. They usually arrive in an email with an enticing subject line such as "You have won a prize!" or "Your computer is at risk!" Adware creators typically use these tactics to trick people into installing them. Once installed, adware will redirect web traffic to advertising websites, record keystrokes entered on the computer to steal information, slow down performance, and display unwanted pop-ups on the screen. These software will often have custom icons that resemble other popular programs like video games or security software, which makes it difficult for some users to know what they're actually installing. Adware also have some of the most intrusive and invasive features of all computer viruses because they often come pre-installed on computers near a school or other areas where children might use them. Adware will often work in the background and set off red flags with anti-virus programs, but not be considered adware by the computer user. This can cause the user to later be surprised when their computer has been infected with adware.
But what is an adware?
What makes a piece of software become an adware? In most cases, it's actually very simple. Typically, a user is sent an email with a link to software that they have to download or install. Once they click on the link and open the file it will contain, they will be prompted with a "download now" button. When they do this, the file will be downloaded and installed on their computer without their consent. This can happen when you're browsing the web or using another program. The last time I checked my Facebook page, it wanted me to download something called Facebook video converter. I did what it asked me to do and was promptly presented with an installation window that said this was going to "improve my experience. It's just a small download that'll take about 3-4 minutes, and then you can go back to your Facebook page and check out all the cool videos you've come across." They could not be more wrong. Facebook video converter is a piece of adware that will slow down your computer and cause redirections to third-party websites it's paid to promote.
What is a Trojan Horse?
There are many types of software that masquerade as legitimate but ultimately do not behave like they're supposed to. Once installed on your computer, they may use the computer in ways that were not intended by the user and cause harm to the system (malicious behavior). One of these programs is called a Trojan horse.
The name is derived from Greek mythology and the Trojan War, but in modern terms it refers to a computer program that appears to perform one function, but through hidden malicious code, performs another. The earliest known Trojan horse was created by the Greek king Epeius who built a large wooden horse and left it outside of Troy as part of the Greek attack on Troy's walls in the year 1274 B.C.. The Greeks then sailed away and left it there for the Trojans to discover. They did exactly that and brought it inside their city where they then celebrated their victory over the Greeks by having a large feast in its name. While they were celebrating, the Greeks returned and opened the gates of Troy, destroying them from the inside. This effectively destroyed Troy and ended the Trojan War.
The same fate is sometimes given to users of Trojan horses. A malicious program that is disguised as a legitimate application may trick them into installing software which carries hidden payloads (malicious software) which perform functions that are harmful to their system. It is sometimes called a "backdoor", because it provides access for malicious actors instead of legitimate ones. This can occur when a user downloads or installs software from an untrusted source like a website or an email attachment.
In short: Trojan = malicious application running on your computer (or mobile device) disguised as something else .
What are Viruses?
Viruses are a type of malware that infects and destroys your computer by infecting all the files. If you have an infection, your operating system may not work correctly or at all. It is also called as "malware". It's usually downloaded when clicking on links that can lead to websites offering malicious software. It can also be downloaded with visiting untrusted websites like porn sites or torrent sites, especially when downloading games or applications from there. Viruses can be typed as:
Ransomware : this malicious software hold the computer useless until ransom is paid to it
Worm: This refers to a self-replicating type of computer program which replicates itself into other systems. The first worm that was created is called the Morris worm. It caused around $18,000 (USD) worth of damage due to its self-replication
Trojan horse: It's a program which opens the door for other programs to enter
Spyware: it can help get information from chat histories to banking information.
Ransomware is a form of malicious software that threatens to publish or delete users' data unless they pay money to the malware operators. The process is usually referred to as cryptovirology. This computer virus locks users' files until they pay a ransom in Bitcoin cryptocurrency or have their personal identification info stolen, such as credit card details and social security number. It's sometimes referred to as "extortionware". The demand for money translates into a loss of privacy and control for users. Once detected and removed, your files will be restored back to normal.
What is a Trojan?
A Trojan horse is a program that appears to be useful, but behind the scenes it's performing harmful actions. This kind of software may come with an attachment that has to be opened in order to access the "unlocked" functionality. The attach may contain malware that is then installed on your computer without you noticing it but you'll notice its effect when the unwanted trickery becomes too much and all your private information gets stolen.
Conclusion
Trojans, viruses, and other malicious software may be installed on your computer by download or attachment of email. They can also be downloaded with visiting an untrusted website.
It's important to remember that they're not necessarily bad. Some of them can help you get things done more quickly and easily. However, you need to be careful in downloading or installing anything off your computer if it looks like a setup file or if it asks for personal information you don't intend to give away before you download something. Trojans are often used as sneaky tricks for scammers because usually the user doesn't realize what's actually happening until he starts experiencing problems or the malicious software gets too intrusive and difficult to remove from his system.
Tags:
Adware Explained