Upload
varun-arora
View
985
Download
5
Embed Size (px)
DESCRIPTION
Presentation on the basics of Trojans, Malwares, Slurpwares
Citation preview
What is Malware? Malicious + Software Made to cause harm Comes bundled with other programs
Types Adware
• Adware is the class of programs that place advertisements on your screen.
Spyware• Send information about you and your computer to somebody else.
Hijackers• Hijackers take control of various parts of your web browser, including
your home page, search pages, and search bar. Toolbars
• Toolbars plug into Internet Explorer and provide additional functionality such as search forms or pop-up blockers.
Dialers• Dialers are programs that set up your modem connection to connect to
a 1-900 number.
www.varunarora.in | [email protected]
Trojan Malware that appears to perform a desirable function but
in fact performs undisclosed malicious functions.
Types Remote Access Data Sending Destructive Proxy FTP Security Software Disabler DoS Attacks (Denial of Service Attacks)
www.varunarora.in | [email protected]
What a Trojan can do?
Erasing or overwriting data on a computer Re-installing itself after being disabled. Upload and download files Copying fake links, which lead to false websites, chats, or other account
based websites, showing any local account name on the computer falsely engaging in untrue context
Falsifying records of downloading software, movies, or games from websites never visited by the victim.
Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)
Spreading other malware, such as viruses (this type of trojan horse is called a 'dropper' or 'vector)
Logging keystrokes to steal information such as passwords and credit card numbers
slowing down your computer displaying pornographic sites
www.varunarora.in | [email protected]
Slurpware
The newest term in Internet security threats
It's when all the effective Internet attack elements come together to potentially steal a lot of money
'organized crime'
www.varunarora.in | [email protected]
References:
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
http://www.webopedia.com/TERM/T/Trojan_horse.html
http://www.informationweek.com/news/security/
vulnerabilities/showArticle.jhtml?articleID=57701972
http://seclab.cs.ucdavis.edu/projects/history/papers/
ande72.pdf
http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-
thompson.pdf
www.varunarora.in | [email protected]
THANK YOU!!
www.varunarora.in | [email protected]