What's the Difference: Computer Virus vs Malware, vs Spyware, etc?

ThioJoe
9 Mar 201914:34

Summary

TLDRThis video script delves into the nuances of various types of malware, clarifying that computer viruses, worms, spyware, and trojans, while often used interchangeably, are distinct in their mechanisms of infection and impact. It explains how viruses require user execution to replicate, worms spread autonomously, and trojans disguise themselves as benign programs. The script also covers other malware categories like spyware, adware, scareware, ransomware, and rootkits, emphasizing the importance of keeping systems updated, regularly backing up data, and utilizing reliable antivirus software to safeguard against these digital threats.

Takeaways

  • 🛡️ Malware is an umbrella term for any type of malicious software that harms a computer.
  • 💾 A computer virus replicates itself by modifying files and requires user execution to spread.
  • 🔄 A computer worm self-replicates and spreads automatically without user intervention, exploiting system vulnerabilities.
  • 🐴 Trojans misrepresent themselves as benign programs but perform malicious activities in the background.
  • 👁️ Spyware collects information from the computer without user permission, often for malicious purposes.
  • 📢 Adware injects advertisements into the user’s browsing experience, sometimes through spyware.
  • 😱 Scareware frightens users into taking actions like paying money, often by threatening them with false consequences.
  • 💰 Ransomware holds the computer or files hostage, demanding payment for their release or decryption.
  • 🔍 Rootkits gain elevated privileges, giving them deep control over the system, making them difficult to detect and remove.
  • 🔧 Protecting against malware involves keeping the operating system and software up to date, backing up data, and using reliable antivirus software.

Q & A

  • What is the general term for all types of malicious software?

    -The general term for all types of malicious software is 'malware'. It is an all-encompassing term that includes any software designed to harm a computer.

  • What differentiates a computer virus from other types of malware?

    -A computer virus is a type of malware that replicates itself by modifying files of other programs, including the operating system, and requires user execution to become active.

  • How does a computer worm differ from a virus in terms of replication and spread?

    -A computer worm differs from a virus in that it can spread automatically without user intervention, often exploiting vulnerabilities in the operating system to infect other computers on a network.

  • What is a Trojan, and how does it typically mislead users?

    -A Trojan, or Trojan horse, is a type of malware that misrepresents itself as a benign program. It tricks users into installing it under the guise of legitimate software, but in reality, it performs malicious actions in the background.

  • What is the primary goal of most malware?

    -The primary goal of most malware is to make money illegally for the creator, often through methods such as stealing personal information, taking control of a computer's resources, or encrypting files for ransom.

  • What is the role of a payload in malware, and is it always present?

    -A payload in malware is the part of the software that performs the actual malicious actions, such as spying, damaging the computer, or encrypting files. It is not always present; for example, many worms spread for the sake of spreading without a specific payload.

  • What is spyware, and how does it operate?

    -Spyware is a type of malware that spies on users by collecting information from the computer and sending it elsewhere without the user's consent. It can operate through keylogging, monitoring web traffic, or injecting advertisements.

  • What is scareware, and how does it attempt to manipulate users?

    -Scareware is a type of malware that uses scare tactics to manipulate users into taking actions such as paying money or downloading software. It often presents false warnings or threats to coerce users into compliance.

  • How does ransomware differ from scareware, and what is its primary method of coercion?

    -Ransomware is a form of scareware that holds the user's computer or files hostage, typically by encrypting files, and demands payment for their release. Its primary method of coercion is the threat of permanent data loss if the ransom is not paid.

  • What is a rootkit, and why is it particularly difficult to remove?

    -A rootkit is a type of malware that gains elevated or administrative privileges on a computer, allowing it to take deep control over the system, including the ability to hide itself from detection. It is difficult to remove because it can control or subvert the very tools meant to remove it, such as antivirus programs.

  • What are three key measures that individuals can take to protect themselves from malware?

    -Three key measures for protection against malware include keeping the operating system and software up to date, regularly backing up data to an external source, and using a reputable antivirus program with internet security features.

Outlines

00:00

🔒 Malware Basics: Understanding Viruses, Worms, and Trojans

This paragraph introduces the concept of malware, explaining that it's an umbrella term for malicious software designed to harm computers. It clarifies that while 'computer virus' is a commonly used term, it's not the most prevalent type of malware. A virus is defined as malicious software that replicates by modifying files, requiring user execution to spread. The paragraph also distinguishes between viruses and worms, noting that worms can propagate without user intervention by exploiting system vulnerabilities. The explanation includes how these threats can infiltrate systems, for instance, through email or file sharing services, and emphasizes the importance of understanding these differences for better computer protection.

05:00

🛡️ Protecting Your System: The Role of Updates and Antivirus

This section delves into the importance of keeping operating systems updated to protect against malware like worms, which exploit outdated software vulnerabilities. It also covers the different types of malware that do not self-replicate but can be equally destructive, such as Trojans, which disguise themselves as benign programs to trick users into installing them. The paragraph discusses various categories of malware, including spyware, adware, scareware, and ransomware, each with unique methods of operation and payloads. It highlights the significance of using antivirus software with internet security features to prevent infection and suggests keeping backups of data to safeguard against ransomware attacks.

10:01

🚨 Advanced Threats: The Dangers of Rootkits and Best Practices

The final paragraph focuses on rootkits, a type of malware that gains deep control over a computer by obtaining administrative privileges. Rootkits can be challenging to detect and remove due to their ability to hide themselves within the system. The paragraph advises on best practices for protection against all types of malware, including keeping software updated, regularly backing up data, and using comprehensive antivirus solutions. It also recommends considering reputable antivirus options and emphasizes the importance of understanding malware behaviors to better defend against them.

Mindmap

Keywords

💡Malware

Malware refers to any software that is intended to cause harm to a computer system. It is an overarching term that includes various types of malicious programs. In the video, malware is the central theme as it encompasses computer viruses, worms, spyware, and other harmful software. The script explains that all the specific types discussed can be considered as subtypes of malware, highlighting its significance in understanding the broader category of threats to computer systems.

💡Computer Virus

A computer virus is a type of malware that replicates itself by modifying other files or programs, including the operating system, to include its own code. The script uses the analogy of a biological virus to explain how a computer virus spreads, requiring user execution to become active and then propagating by modifying other files. The video emphasizes that viruses are not the most common type of malware but are often the most well-known due to their ability to replicate and spread once activated.

💡Worm

A worm is a self-replicating malware that can spread across networks without the need for user interaction. Unlike a virus, which requires a host program to execute, a worm can propagate on its own by exploiting vulnerabilities in operating systems. The script illustrates this by explaining how worms can scan and infect other computers on a network automatically, using the example of a worm that uses an OS exploit to download and run itself without user intervention.

💡Trojan

A Trojan, short for Trojan horse, is a type of malware that disguises itself as legitimate software to trick users into installing it. The script clarifies that Trojans do not replicate like viruses or worms but instead perform malicious actions in the background after being installed. Examples given in the video include fake antivirus programs that pretend to find infections to scare users into paying for a premium service.

💡Spyware

Spyware is a form of malware designed to collect information from the infected computer and send it to a third party without the user's consent. The script explains that spyware can include keyloggers that record keystrokes to steal sensitive information like passwords and credit card numbers. It is related to the video's theme by illustrating how different types of malware can invade user privacy and compromise security.

💡Adware

Adware is a type of malware that displays unwanted advertisements on a user's computer. The script mentions adware in the context of spyware, explaining that adware can inject advertisements into web traffic or replace links with affiliate ads. This keyword is relevant to the video's theme as it represents another way in which malware can be used to generate revenue for its creators at the expense of user experience and security.

💡ScareWare

ScareWare is a category of malware that uses fear tactics to manipulate users into taking certain actions, such as paying a fine or purchasing a premium service. The script provides examples of scareware, such as fake FBI warnings or IRS threats, that aim to scare users into compliance. This concept is integral to the video's message about the deceptive tactics used by some types of malware.

💡Ransomware

Ransomware is a specific type of scareware that encrypts a user's files and demands payment in exchange for the decryption key. The script differentiates ransomware from other scareware by its potential to cause real damage, as it can permanently lock users out of their files if the ransom is not paid. This keyword is central to the video's discussion on the severe consequences of certain types of malware.

💡Rootkit

A rootkit is a type of malware that gains deep control over a computer by obtaining administrative or root-level access. The script explains that rootkits can hide themselves from detection by manipulating the operating system at its core, making them extremely difficult to remove. The video uses the concept of a rootkit to illustrate the most invasive and dangerous types of malware that can control and hide within the system.

💡Antivirus

Antivirus software is a program designed to detect, prevent, and remove malware from a computer system. The script recommends the use of antivirus software as a key defense against various types of malware, mentioning features like internet security and anti-ransomware capabilities. The video positions antivirus software as a crucial tool in protecting against the threats discussed throughout the script.

💡Vulnerability

A vulnerability in the context of the script refers to a weakness in a computer system or software that can be exploited by malware to infect or control the system. The video explains how worms, rootkits, and other types of malware often use vulnerabilities to propagate or gain control, emphasizing the importance of keeping systems updated to protect against known vulnerabilities.

Highlights

Malware is an all-encompassing term for any software that does harm to a computer, and includes various subgroups.

A computer virus replicates itself by modifying files for other programs, including the operating system, to execute its code.

Virus requires user execution to become active and then replicates, often spreading through emails or file sharing services.

A computer worm self-replicates and spreads automatically without user intervention, exploiting vulnerabilities in operating systems.

Worms can infect an entire network by scanning for computers with the same vulnerability and infecting them automatically.

Trojans, or Trojan horses, misrepresent themselves as benign programs but perform malicious actions in the background.

Trojans are the most common type of malware and can trick users into installing them under the guise of legitimate software.

Spyware collects information from the computer and sends it elsewhere without the user's permission, often through keylogging or monitoring web traffic.

Adware is a type of malware that adds unwanted advertisements to a user's computer, potentially through injected affiliate links.

ScareWare tricks users into taking action, such as paying money, by using fear or threats, like fake FBI warnings or virus alerts.

Ransomware is a form of scareware that encrypts user files and demands payment for decryption, with the threat of data loss.

Rootkits gain deep control over the computer, allowing them to hide themselves effectively and resist removal by antivirus programs.

Keeping the operating system and software up to date is crucial for protecting against malware exploits and vulnerabilities.

Backing up data regularly can safeguard against data loss in the event of a ransomware attack or other malware damage.

Using antivirus software with internet security features can prevent malware from reaching the computer and block ransomware activities.

Bitdefender and ESET NOD32 are recommended antivirus options, with the suggestion to research the best antivirus for the current year.

The video concludes with a reminder of the importance of understanding different types of malware to better defend against them.

Transcripts

play00:00

computer viruses malware spyware trojans

play00:03

worms are all these terms referring to

play00:06

the same thing and the answer is

play00:07

technically no they are different and

play00:09

we're going to go over what these

play00:10

differences are whether it's how they

play00:12

spread or what these things do to your

play00:14

computer so maybe it's just out of

play00:16

curiosity or it can help you protect

play00:18

your computer going forward the first

play00:21

term we can go over is pretty simple

play00:22

which is malware and this refers to any

play00:25

and all kinds of malicious software it's

play00:27

an all-encompassing term for any type of

play00:29

software that does harm to a computer

play00:32

and all the terms we're going to be

play00:34

talking about in this video could be

play00:36

considered malware it's like an umbrella

play00:38

term but there are lots of subgroups so

play00:40

we're going to go over the different

play00:41

categories and types of malware there

play00:43

aren't really too many but when it comes

play00:45

down to it all malware usually has the

play00:48

same goal which is to make money

play00:50

illegally for the creator of the malware

play00:52

the first term we can talk about is a

play00:54

computer virus which is usually the term

play00:56

that most people use all the time but

play00:58

it's not actually the most common type

play01:00

of malware we'll get to that in a bit

play01:02

but regardless a computer virus is

play01:04

basically the name for malicious

play01:06

software that when executed replicates

play01:09

itself by modifying files for other

play01:12

programs and possibly including the

play01:14

operating system itself so that way

play01:16

because these files are modified to now

play01:18

include the virus whenever that program

play01:20

or the operating system is started then

play01:22

it will also run the virus code and this

play01:25

could be for any number of reasons

play01:27

stealing personal information taking

play01:30

control of the computer and using its

play01:31

computer power or storage for something

play01:33

that the author of the virus wanted lots

play01:35

of typical virus stuff you can imagine

play01:38

but really the main differentiator for a

play01:39

virus is that it remains dormant until

play01:42

it's actually run by the user and then

play01:44

when it is it replicates itself in some

play01:47

way and this file may come in the form

play01:49

of an exe file which is executed

play01:51

directly or perhaps it's embedded in a

play01:54

macro in a microsoft word document or

play01:57

something like that so when you run the

play01:59

program microsoft word it exploits that

play02:01

and executes and then embeds itself in

play02:03

the rest of the computer that way so

play02:05

again downloading the file is not enough

play02:07

to infect your computer but once you do

play02:09

run it presumably thinking it's

play02:10

something else then it does its virus

play02:13

thing and it may spread itself by

play02:16

sending out an email to all your

play02:17

contacts the same way it was infecting

play02:20

you that way perhaps or maybe it puts

play02:23

itself in the upload folder for

play02:25

bittorrent so then it also uploads

play02:27

itself to

play02:28

the file sharing service so other people

play02:31

will download it something like that so

play02:32

really the term virus has two qualities

play02:35

it describes how it's spread which is

play02:37

itself replicates and it's also run

play02:40

manually by a user now the next term

play02:42

might seem a bit similar and that is a

play02:44

computer worm so this also self

play02:46

replicates but it also has a very

play02:49

important difference in that unlike a

play02:51

virus which needs to be manually run by

play02:53

user a computer worm can spread itself

play02:56

automatically without user intervention

play02:59

so this means it doesn't need a host

play03:01

program to run like ms word or the exe

play03:04

file that you need to run it can do this

play03:06

automatically it basically scans for

play03:09

other computers on the network that it

play03:10

can infect and then it does so

play03:12

automatically if it's able to of course

play03:15

a worm will probably also have the

play03:16

ability to be run manually by user and

play03:19

infect computers that way that might be

play03:21

how it initially gets started within a

play03:23

network and then spreads automatically

play03:25

from there from that first person doing

play03:27

it and worms actually spread using

play03:28

vulnerabilities and exploits of

play03:30

operating systems themselves to infect

play03:32

all the computers in a network so once

play03:34

one computer is infected it scans like i

play03:36

said all the other computers on network

play03:38

sees if any other computers have that

play03:40

same vulnerability and then infects them

play03:42

automatically without any user

play03:45

transferring files or anything like that

play03:46

it all happens automatically in the

play03:48

background from the virus itself and if

play03:49

you're wondering wait a minute how can

play03:51

the

play03:52

worm spread to other computers if the

play03:54

user isn't actually even running it well

play03:57

it shouldn't be able to and that's why

play03:59

it is an exploit of a vulnerability the

play04:01

operating system is not designed to work

play04:03

like that but for whatever reason the

play04:06

worm is able to trick the operating

play04:08

system in not only downloading that file

play04:10

and downloading the worm but also

play04:12

running it with zero user intervention

play04:15

because of that exploit now again the

play04:17

term worm only describes the software

play04:20

based on how it spreads and replicates

play04:22

it doesn't actually say or define what

play04:25

it does once it does infect things in

play04:27

fact apparently most computer worms

play04:30

don't actually contain a so-called

play04:32

payload which is like side code that

play04:35

will do virus stuff that you typically

play04:37

think of like spying on it or damaging

play04:41

the computer so it might just spread

play04:43

just for the heck of spreading but that

play04:45

doesn't mean that it won't harm the

play04:47

network it still uses up cpu power and

play04:50

bandwidth and stuff like that but if it

play04:52

does happen to have a payload it could

play04:54

do any number of things that you

play04:55

typically associate with malware such as

play04:57

encrypting files for ransomware spying

play05:00

and stealing credit card information or

play05:02

even installing a so-called back door

play05:05

which might allow the computer to be

play05:06

controlled by the creator of the worm

play05:09

and then added into a botnet to do all

play05:12

sorts of malicious things as a group

play05:14

with other computers and worms are just

play05:16

one more example of why you need to keep

play05:18

your operating system up to date because

play05:20

that's just one example of software that

play05:22

can take advantage of exploits in your

play05:24

operating system usually older versions

play05:26

after they've been discovered and people

play05:28

don't update and it's a hacker's dream

play05:30

to be able to take advantage of these

play05:32

things and really it's so easy to avoid

play05:35

just keep your software up to date so

play05:36

both viruses and worms spread themselves

play05:39

and replicate themselves in one way or

play05:41

another whether it's manually by user or

play05:43

automatically through a worm but there

play05:45

are plenty of other types of malware

play05:47

that don't replicate themselves but are

play05:48

just as destructive so the next type we

play05:51

can mention are trojans or trojan horses

play05:54

which is a type of malware that

play05:55

misrepresents itself as a normal or

play05:58

benign program but really it in the

play06:00

background will be doing malicious

play06:02

things so it basically tricks the user

play06:04

into installing it because it thinks

play06:06

it's something else it thinks it's

play06:08

something legitimate and typically

play06:09

trojans are the most common type of

play06:12

malware out there and they may actually

play06:14

look like real programs they may run

play06:17

they may do their intended purpose like

play06:19

if it's a calculator app or something it

play06:21

might actually be able to calculate

play06:23

things and look like a calculator but

play06:25

it's main purpose is to get you to

play06:27

download it thinking it's just a

play06:28

calculator and then it does all this

play06:30

other stuff behind the scenes without

play06:32

you knowing another really common

play06:33

example are fake antivirus programs that

play06:36

tell you oh look how many computer

play06:38

viruses and infections we found you

play06:40

better buy our premium package to remove

play06:42

all these when in reality that antivirus

play06:45

program itself is the virus it's fake

play06:48

and these trojans can be spread in any

play06:50

number of ways that you can imagine such

play06:51

as spam email attachments that come out

play06:54

of the blue they might be fake

play06:56

advertisements or through social media

play06:59

stuff like that but again the main

play07:00

differentiator between a trojan and say

play07:02

a virus is that a trojan doesn't inject

play07:05

itself into other files of other

play07:07

programs and doesn't replicate itself

play07:10

and send it to other people or anything

play07:12

like that if it did it would be

play07:13

considered a virus so those three

play07:15

categories viruses worms and trojans

play07:17

typically describe the way that the

play07:20

malware spreads but they don't talk

play07:22

about how much or necessarily what

play07:24

damage they do once they do infect and

play07:26

there are categories for that that we

play07:28

can talk about next the first of these

play07:29

is spyware which just like the name

play07:32

suggests is software or malware that

play07:34

spies on you or collects information

play07:37

from the computer and then sends it

play07:38

somewhere else now technically spyware

play07:41

could include programs that aren't even

play07:44

illegal like you do give them permission

play07:47

to spy on you and collect information

play07:49

but usually the vast majority of the

play07:51

time when someone says spyware they're

play07:53

referring to malware that did not get

play07:55

your permission to collect any

play07:57

information at all and it is malicious

play07:59

and spyware could come in lots of

play08:00

different flavors it could be a key

play08:02

logger which literally collects every

play08:04

single letter that you type in hoping to

play08:07

collect passwords or credit card numbers

play08:09

or bank accounts and stuff like that it

play08:11

may also monitor what you're doing

play08:13

online and what monitoring your web

play08:15

traffic to be able to inject things into

play08:17

it such as advertisements or maybe

play08:19

replacing links with affiliate links or

play08:22

advertisements to websites that it

play08:24

wasn't necessarily going to direct to

play08:26

and usually malware that adds

play08:29

advertisements to your computer in one

play08:31

way or another is typically referred to

play08:33

as adware so it may be that some of the

play08:35

malware that we talk about in this video

play08:37

may actually fall under multiple

play08:39

categories another couple big categories

play08:41

are scareware and ransomware ransomware

play08:44

may be considered a subcategory of

play08:46

scareware we'll get to that but

play08:48

scareware is typically some sort of

play08:51

malware that tricks a user into paying

play08:53

money or doing something by scaring them

play08:56

or threatening them so one example might

play08:58

be a virus or a trojan or whatever that

play09:01

pops up on the screen a big thing that

play09:03

says you're being arrested by the fbi

play09:05

unless you pay up this money as a fine

play09:07

or something like that it scares you

play09:09

like oh my god i don't want to get

play09:10

arrested and then some people might

play09:12

actually pay or a lot like those irs

play09:14

scams that you get on the phone it might

play09:16

be something similar on the computer it

play09:18

says if you don't send this much bitcoin

play09:21

to this address then the irs is going to

play09:23

arrest you and you're going to go to

play09:24

jail but it doesn't necessarily have to

play09:26

threaten you it could be again just to

play09:27

scare you a lot of advertisements for

play09:29

example that are kind of sketchy you've

play09:31

probably seen them it says your computer

play09:33

is infected with so many viruses click

play09:35

here to clean your computer and all that

play09:38

sort of thing obviously it doesn't know

play09:40

if your computer is infected or not it's

play09:41

just trying to scare you into doing it

play09:43

and that would be scareware now

play09:44

ransomware is a form of scareware that

play09:47

will typically hold your computer

play09:49

hostage in one way or another until you

play09:51

usually pay some sort of amount of money

play09:54

sometimes ransomware may just be kind of

play09:56

bluffing and it only locks your computer

play09:59

in a way that's pretty easy to reverse

play10:01

if you know what you're doing and it

play10:02

doesn't actually affect any of your

play10:03

files but other times ransomware does

play10:06

have teeth and it actually will encrypt

play10:08

your files for example and it says if

play10:11

you don't pay us this amount of money

play10:12

within this amount of time we're going

play10:14

to destroy the decryption key and your

play10:16

files will actually be gone and the

play10:18

reason they do this is because if people

play10:21

know that their software out there that

play10:23

this one isn't bluffing then they're a

play10:25

lot more likely to pay up to get their

play10:27

files back if they haven't backed up for

play10:28

example all right now the final type of

play10:30

malware we're going to talk about in

play10:31

this video at least is root kits and

play10:34

root kits usually take over the computer

play10:36

by gaining elevated privileges or

play10:38

administrative

play10:39

privileges and the name rootkit comes

play10:41

from the term root privileges which just

play10:44

means something that has control over

play10:46

the deepest most secure parts of the

play10:49

operating system and because this type

play10:51

of malware does have such deep control

play10:53

over the computer it can hide itself

play10:55

very well it literally has control over

play10:58

everything it can even hide itself by

play11:00

not even including itself in the list of

play11:02

processes like in the task manager or

play11:04

something like that complete control and

play11:06

this obviously means it's going to be

play11:08

very very hard to remove if not

play11:10

impossible because it will even have

play11:12

control over the programs that are meant

play11:15

to remove it such as anti-virus programs

play11:17

it could prevent you from installing

play11:19

anti-virus programs it can stop those

play11:21

anti-virus programs from running stuff

play11:23

like that so a lot of times especially

play11:26

if the root kit is embedded in the

play11:28

kernel which is the core of the

play11:29

operating system usually if you get a

play11:31

root kit the best thing is to just

play11:33

completely wipe the drive and reinstall

play11:36

the operating system from scratch

play11:37

because you don't know if you actually

play11:39

removed everything and if it's actually

play11:41

still hiding and waiting to reinstall

play11:43

itself later and rootkits usually are

play11:45

able to install themselves using

play11:47

operating system vulnerabilities and

play11:48

exploits like we kind of talked about

play11:50

before or stealing admin credentials or

play11:54

using credentials it found to then take

play11:56

over now at this point you might be

play11:58

worried you're like oh how do i protect

play12:00

myself and there's really three things

play12:01

you can do that will almost certainly

play12:03

protect you 99 of the time and the first

play12:06

of these is to of course keep your

play12:08

operating system and software up to date

play12:10

i've said this so many times do not skip

play12:12

windows updates update as soon as you

play12:14

get the ability to and that way if you

play12:16

get like a zero day vulnerability which

play12:18

is something that was just discovered

play12:20

and released immediately to the public

play12:22

and hackers will be jumping on that to

play12:23

try and get people who don't update

play12:25

right away so keep stuff up to date and

play12:27

you'll be protected from any exploits

play12:29

the next thing which is really important

play12:30

i've said this before again is to back

play12:32

up your data have backup copies of your

play12:34

data

play12:35

hopefully on a external hard drive that

play12:38

is not connected to the computer so a

play12:41

ransomware can't encrypt the backup as

play12:43

well or using something like cloud

play12:45

backup that is off site this way if you

play12:48

do get malware that harms your files or

play12:50

does something else to your computer

play12:51

that requires a reinstallation of your

play12:53

os it'll be way easier to recover them

play12:56

especially in the case of ransomware and

play12:58

finally the third major thing is to use

play13:01

some sort of antivirus i mean it's

play13:03

better than nothing to have the one

play13:04

that's built into your computer such as

play13:06

windows defender whatever it's called

play13:08

now again better than nothing if you

play13:10

know you're doing but ideally you use a

play13:13

type of antivirus that has something

play13:15

called internet security which usually

play13:17

kind of scans for things coming across

play13:19

the network and usually can block things

play13:21

before they ever even get to your

play13:22

computer and a lot of these antiviruses

play13:24

also have anti-ransomware features that

play13:27

will stop a program from running if it

play13:29

sees that it's modifying files like

play13:31

ransomware might do if you're looking

play13:32

for suggestions for some options for

play13:34

antiviruses one good option is

play13:37

bitdefender full disclosure they did

play13:39

sponsor a previous video of mine but

play13:41

they're not sponsoring this one there's

play13:43

no sponsor for this video another good

play13:45

option is eset knob32 i've used them in

play13:47

the past haven't had any problems but

play13:50

really you can just go on google and

play13:52

search best antivirus current year at

play13:54

the end of it and look at tests and see

play13:57

what one is the best for the current

play13:59

year so hopefully that clears things up

play14:01

if you didn't know about the differences

play14:03

between names of other types of malware

play14:05

now you do and you might have a better

play14:07

understanding of how certain types of

play14:09

malware spread so you can better defend

play14:11

your computer against it you'll kind of

play14:13

know what you're up against if you guys

play14:14

want you can keep watching by clicking

play14:16

some other videos i have on here and on

play14:18

my channel and be sure to let me know

play14:20

that you think down in the comment

play14:22

section did you know about these or is

play14:24

there something i forgot about we could

play14:25

talk about that down in the comments so

play14:27

again hopefully you guys enjoyed this

play14:28

video if you want to subscribe i make a

play14:30

few new videos every week so until next

play14:32

time be seeing you

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
Malware TypesComputer VirusWormsTrojansSpywareRansomwareRootkitsCybersecurityProtection TipsAntivirus Software
Besoin d'un résumé en anglais ?