Page 26 - Enchiridion 4.0 program_EN
P. 26
Strategic Partnerships for school education 2019-1-PL01-KA201-065137
Project: Teacher4.0 - comprehensive method of implementation of Industry 4.0
concept into didactic practice in primary and secondary schools
total control. There are numerous types of malware, with the list growing every day. Hackers’ efforts
are increasing in sophistication, so it’s vital to know to protect your digital devices from them.
Most malware infections occur when the user performs an action that causes the malware to be
downloaded. This action might be clicking a link in an email, or visiting a malicious website. Also, by
loading the firmware of a USB stick or flash drive or external hard drives onto the device’s internal
hardware. In other cases, hackers spread malware through peer-to-peer file sharing services and free
software download bundles such as screensavers, toolbars or torrents from an untrustworthy source.
Clicking on pop-ups or downloading pirating software, music, or movies can also install malware on
the device. Embedding a bit of malware in a popular torrent or download is an effective way to
spread it across a wide user base. Mobile devices can also be infected via text messages.
Once the malware has been installed, it infects the digital device and begins working towards the
hackers’ goals. It’s beneficial to learn about the various types of malware and ways to protect the
digital devices used by teachers and students to safeguard their personal data from hacker’s attacks.
1. Spyware
Spyware is a type of malware designed to allow a hacker to spy on users, gathering information like
internet activity, login credentials, and more. When a hacker uses spyware, they can gain access to
any type of sensitive information your users view. This means personal details, card payment
information, HIPAA-covered data, and more. While spyware is dangerous, it’s fortunately fairly easy
to remove.
2. Adware
Adware is a type of malware that causes ads to show up on your computer in an attempt to generate
revenue for the ad creator. Sometimes, adware is closely related to spyware and commonly shows
up in the form of pop-up ads or ads embedded in software or a program.
3. Ransomware
Ransomware does exactly what its name describes – holds your computer or device under the
hacker’s control in an effort to gain ransom money. In this scenario, hackers infiltrate devices with
ransomware, locking users out unless they pay. In some cases, the ransomware hackers will threaten
to release sensitive data to the public or on the dark web unless the ransom is paid.
4. Trojan Horse
A Trojan horse malware attack is one of the most common kinds of threats. In this attack, hackers
disguise the malware as something appealing, like a free download, special gift, or exclusive offer.
Once the disguised malware infiltrates the network, any data can be stolen.
5. Viruses
This project has been funded with support from the European
Commission. This communication reflects the views only of the
author, and the Commission cannot be held responsible for any
use which may be made of the information contained therein.