Jump to content

User:GDubuc (WMF)/sandbox/leadsection-2

From Wikipedia, the free encyclopedia

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.[1] Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. The term badware is sometimes used, and applied to both true (malicious) malware and unintentionally harmful software.[2]

Malware may be stealthy, intended to steal information or spy on computer users for an extended period without their knowledge, as for example Regin, or it may be designed to cause harm, often as sabotage (e.g., Stuxnet), or to extort payment (CryptoLocker). 'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software,[3] including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.[4] Malware is often disguised as, or embedded in, non-malicious files. As of 2011 the majority of active malware threats were worms or trojans rather than viruses.[5]

In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states.[6][7]

Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics. An example of such software, which was described as illegitimate, is the Sony rootkit, a Trojan embedded into CDs sold by Sony, which silently installed and concealed itself on purchasers' computers with the intention of preventing illicit copying; it also reported on users' listening habits, and unintentionally created vulnerabilities that were exploited by unrelated malware.[8]

Software such as anti-virus, anti-malware, and firewalls are used to protect against activity identified as malicious, and to recover from attacks.[9]

  1. ^ "Malware definition". techterms.com. Retrieved 26 August 2013.
  2. ^ "What is badware?". StopBadware. Retrieved 18 February 2015.
  3. ^ "Defining Malware: FAQ". technet.microsoft.com. Retrieved 10 September 2009.
  4. ^ "An Undirected Attack Against Critical Infrastructure" (PDF). United States Computer Emergency Readiness Team(Us-cert.gov). Retrieved 28 September 2014.
  5. ^ "Evolution of Malware-Malware Trends". Microsoft Security Intelligence Report-Featured Articles. Microsoft.com. Retrieved 28 April 2013.
  6. ^ "Virus/Contaminant/Destructive Transmission Statutes by State". National Conference of State Legislatures. 14 February 2012. Retrieved 26 August 2013.
  7. ^ "§ 18.2-152.4:1 Penalty for Computer Contamination" (PDF). Joint Commission on Technology and Science. Retrieved 17 September 2010.
  8. ^ Russinovich, Mark (31 October 2005). "Sony, Rootkits and Digital Rights Management Gone Too Far". Mark's Blog. Microsoft MSDN. Retrieved 29 July 2009.
  9. ^ "Protect Your Computer from Malware". OnGuardOnline.gov. Retrieved 26 August 2013.