{"id":1086,"date":"2012-01-05T11:57:11","date_gmt":"2012-01-05T16:57:11","guid":{"rendered":"https:\/\/www.bumc.bu.edu\/it\/?page_id=1086"},"modified":"2022-08-12T03:37:24","modified_gmt":"2022-08-12T07:37:24","slug":"malware","status":"publish","type":"page","link":"https:\/\/www.bumc.bu.edu\/it\/infosec\/prevention\/malware\/","title":{"rendered":"What is Malware?"},"content":{"rendered":"<p><strong><img loading=\"lazy\" class=\"alignright\" src=\"http:\/\/www.articlesweb.org\/blog\/wp-content\/uploads\/2011\/10\/spyware-and-malware-1.png\" alt=\"\" width=\"280\" height=\"216\" \/>Malware<\/strong> is a term used to describe malicious software that is designed to disrupt normal computer operation, gather personal information, gain unauthorized access to system resources and exhibit other unwanted activity. Some of the most common forms of malware are as follows:<\/p>\n<p>A\u00a0<strong>virus<\/strong> is a computer program or a code that attaches itself to a &#8220;host&#8221; \u00a0program on one computer. It then replicates itself and attempts to transfer itself to another computer. Each time the infected host program runs, the virus runs too and it is able to further reproduce, attaching to other programs or causing other computer issues. A virus can be transmitted through files as well as through e-mails. An\u00a0<strong>e-mail virus<\/strong> attaches itself to e-mail messages and often automatically sends itself to contacts in the victim&#8217;s address book. Some e-mail viruses launch when you view the infected message in the preview pane of your e-mail, while others require you to open the attachment<\/p>\n<p>A\u00a0<strong>trojan <\/strong>(also called a trojan horse) is a harmful program that appears to be a helpful one. For example, a trojan may appear as a pop-up stating that your computer has been infected by a virus and may invite the user to click the pop-up to remove it. In this case, clicking the pop-up would activate the virus on your computer. A trojan opens a backdoor into your computer allowing the attacker to do just about anything.<\/p>\n<p>A\u00a0<strong>worm<\/strong> is a stand-alone program that uses computer networks, USB drives, e-mails and other security vulnerabilities to replicate itself. It uses the network to find other machines that have a security hole and copies itself to the other machine.<\/p>\n<p><strong>Spyware <\/strong>is a type of malware that installs itself on a computer and collects information about the user without their knowledge. Spyware can use keystroke logging techniques to collect passwords you enter, your bank account numbers and PINs, your credit card numbers, and other personal information. This type of identity theft can be costly and very time consuming to rectify.\u00a0Spyware can dramatically slow your computer, cause pop-ups or inappropriate site redirection in your web browser, block you from performing certain actions, or just cause general malfunctioning of software on your computer.\u00a0Detecting and removing spyware helps you avoid these problems and keeps your computer running properly and efficiently.<\/p>\n<p><strong>Adware<\/strong>, a\u00a0related category of software to spyware,\u00a0may cause pop-up advertisements to appear on your screen, change your home page, disrupt your network access, and reduce the stability and usability of your system.<\/p>\n<p><strong>If you believe your computer is infected with malware, contact the BUMC IT Service Desk at (617) 638-5914 or\u00a0<a href=\"mailto:bumchelp@bu.edu\">bumchelp@bu.edu<\/a>. You can also submit an\u00a0<a href=\"http:\/\/www.bumc.bu.edu\/ithelp\">IT Request<\/a>.<\/strong><\/p>\n<p><strong>If you have any questions, please fill out <a href=\"https:\/\/forms.office.com\/r\/S6giG7n37e\">this form<\/a> and we will get back to you as soon as possible.\u00a0<\/strong><\/p>\n<table style=\"background-color: #f7fec2; border: 1px solid #000000;\" border=\"1\" cellspacing=\"3\" cellpadding=\"3\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"text-align: center;\">Warning: Watch out for fake virus alerts<\/h3>\n<p style=\"text-align: center;\">A few of the other programs that are referred to as \u201c<strong>rogue security software<\/strong>\u201d claim to remove spyware\u00a0<em>but\u00a0are\u00a0themselves\u00a0spyware<\/em>.\u00a0<strong>Never install \u201cspyware-removal\u201d software that you see advertised on pop-up windows without checking it out first. Learn more about <\/strong><strong><a title=\"Rogue Security Software\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/prevention\/rogue\/\">rogue security software<\/a>.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware is a term used to describe malicious software that is designed to disrupt normal computer operation, gather personal information, gain unauthorized access to system resources and exhibit other unwanted activity. Some of the most common forms of malware are as follows: A\u00a0virus is a computer program or a code that attaches itself to a [&hellip;]<\/p>\n","protected":false},"author":5559,"featured_media":0,"parent":388,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/1086"}],"collection":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/users\/5559"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/comments?post=1086"}],"version-history":[{"count":18,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/1086\/revisions"}],"predecessor-version":[{"id":12349,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/1086\/revisions\/12349"}],"up":[{"embeddable":true,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/388"}],"wp:attachment":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/media?parent=1086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}