Get Off My Machine!3:29 with Greg Stromire
Some attacks are considerably more aggressive, targeting your system and hiding from detection. Malware can be considered any program on your device with malicious intent. While infection does occur less frequently, even the passive varieties can lead to serious consequences.
- Malware -- Software that is intended to damage or disable computers and computer systems.
- Email Attachments -- Files that are sent in addition to the text body of an email. Can be used as delivery mechanisms for malware.
- RootKits -- Malware installed the system level to provide unauthorized access and control.
- Keylogger -- A type of malware that records keystrokes to potentially capture sensitive information.
- USB Drives -- Portable media devices that can be inserted into the USB ports of computers. Sometimes intentionally “dropped” so target will pick them up and insert them into a device, delivering a malware payload.
Most of what we've discussed in this course focuses on security and 0:00 privacy while online. 0:03 Some attacks are considerably more aggressive, targeting your system and 0:05 hiding from detection. 0:08 Malware can be considered any program on your device with malicious intent. 0:10 While infection does occur less frequently, 0:15 even the passive varieties can lead to serious consequences. 0:18 This video will discuss the various approaches that hackers may take 0:22 in order to gain access, not just to an account or two, but to your whole system. 0:25 Once access is gained, these malicious programs can do anything from take 0:31 complete control, encrypt your data and demand a ransom to decrypt. 0:34 Search for sensitive files and data, like passwords and 0:39 bank records, hide in the background and transmit all your actions. 0:42 Or even lay dormant until called on to participate with other infected computers 0:46 in a coordinated attack, without your even knowing it. 0:51 Email attachments are something we use all the time, so naturally, 0:54 they make a great delivery mechanism for malware. 0:58 Detecting dangerous attachments is particularly tricky because the programs 1:01 often use an infected computer's contact list. 1:05 Meaning, that attachment you got from a co-worker may not be trustworthy. 1:08 Verify the sender when possible. 1:13 Be especially cautious if the attachment requires installation. 1:16 Look for other inconsistencies, like spelling and grammar mistakes. 1:20 Root kits and key loggers are programs that can get installed at the system level 1:24 and make them hard to detect and harder to remove. 1:29 Root kits allow unauthorized access to your computer, or even your cellphone. 1:32 A key logger is a specialized root kit that records every key you press, and 1:37 potentially sends that record over the Internet. 1:41 Could be installed from an e-mail attachment. 1:44 Some manufacturers, like Lenovo, 1:47 have included root kits in their devices before selling, do your research! 1:50 Keyloggers track your keyboard activity, so they're no match for 1:55 even the strongest passwords, but 2-factor auth can offer some protection here. 1:59 Found USB drives can seem harmless enough. 2:04 You see one on the ground, and like searching through a lost wallet for 2:08 a way to return it to its owner, you plug the drive into your computer. 2:11 Even without manually installing anything suspicious, 2:16 your system could be compromised. 2:19 This is actually a fairly well-known technique for attackers. 2:21 That takes advantage of the fact that many computers 2:24 would automatically trust anything plugged into the drives, 2:27 essentially passing the responsibility onto you. 2:31 Don't trust anonymous drives found on the ground. 2:34 Be cautious of drives given to you for free. 2:38 There are devices available that can scan drives, if you suspect anything. 2:41 We've explored different methods used to get your system infected. 2:46 Whether it's something you download, something that's already installed on your 2:49 device, or even something you or someone else could plug in directly. 2:53 We've also seen what an infected system can do, whether it's take full control, 2:58 record every action, or use contact info to send malware around. 3:02 There are even variations that can take control of webcams and spy on people, 3:07 a problem that can be addressed with a sticky note over to the camera. 3:11 This is not to frighten you, but to simply introduce these concepts as risks and 3:15 instill a healthy suspicion. 3:19 Malware could be full course on its own, and we've really only scratched 3:22 the surface, but suffice is to say, be mindful of what you install. 3:25
You need to sign up for Treehouse in order to download course files.Sign up