Malware: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 19: | Line 19: | ||
Malware can infect systems through various means: | Malware can infect systems through various means: | ||
[[File:fish_icon.svg|frameless|20px]] '''Phishing''': Cybercriminals send deceptive emails or messages with malicious attachments or links, tricking users into downloading malware. <br> | [[File:fish_icon.svg|frameless|20px]] '''Phishing''': Cybercriminals send deceptive emails or messages with malicious attachments or links, tricking users into downloading malware. <br> | ||
[[File:download_icon.svg|frameless|20px]] '''Drive-by Downloads''': Visiting compromised websites can automatically download malware onto a user's device without their consent or knowledge. <br> | [[File:download_icon.svg|frameless|20px]] '''Drive-by Downloads''': Visiting compromised websites can automatically download malware onto a user's device without their consent or knowledge.<br> | ||
[[File:virus_v2_icon.svg|frameless|20px]] '''Infected Software''': Downloading software from untrusted sources can lead to malware infection if the software is compromised. <br> | [[File:virus_v2_icon.svg|frameless|20px]] '''Infected Software''': Downloading software from untrusted sources can lead to malware infection if the software is compromised. <br> | ||
[[File:usb_icon.svg|frameless|20px]] '''Removable Media''': Malware can spread through infected USB drives or external storage devices when plugged into a computer. <br> | [[File:usb_icon.svg|frameless|20px]] '''Removable Media''': Malware can spread through infected USB drives or external storage devices when plugged into a computer. <br> |