Modern viruses have become far worse than they use to be. Distributers of viruses and malware are more often criminals than pranksters whose product is designed to gather information which can be sold to other thieves, or used to steal money directly from you

Computer Viruses: 

  • Worm: A computer virus which infects computers through a network.
  • Trojan: Any piece of malicious software which is disguises as - or attaches to an attractive piece of software. Two common false downloads containing Trojans are fake installers for Adobe Flash Player or Adobe Acrobat Reader. 
  • Key-Logger: Software hidden on a machine which records all of a user's keystrokes and possibly their web activity. Algorithms are then used to harvest passwords, credit card numbers, and banking information.
  • Zombie: A machine which has been infected, and now runs software allowing criminals to put that computer's processor to work. This happens either by utilizing the processor for calculations, or by using the machine as an untarnished source for email spamming.
  • Phishing: When a website or program pretends to be another site or entity and asks for your credentials. Users will often receive an email/pop-up that they believe is valid. The email will link to a website where the user will be asked for their password or call a number. The criminals will attempt to gain control of the machine by asking the user to open a connection, or they will simply collect and sell the passwords that the user enters.
  • Adware: This causes a machine to show ads to a user. Sometimes the user may not even see the ads - the main goal is to make money each time the ad is loaded, even in the background. Adware is often coupled with a warning, inviting the user to call a number to get rid of the ad, but this number is nothing more than a phishing attempt.



To protect yourself from attacks, CTI recommends following our 3 pillars of computer security: Awareness | Anti-Virus | Data-Backup