Malware Lifecycle

Topics: Windows Vista, Antivirus software, Computer virus Pages: 2 (463 words) Published: September 27, 2014
Unit 6 Assignment 1: Malware Lifecycle
While reviewing the recent threats on the McAfee website, the Trojan picked was RDN/Generic Dropper!uw!27358B83E748. This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc. The indication of having this infection would mean your machine would have the files, registry, and network communication referenced in the characteristics section of the Trojan’s profile page at Use the following steps for removing the Trojan from the system: 1) Disable Windows System Restore. 2) Update your McAfee Anti-Virus product to the latest version (when possible), and ensure the latest DAT and Engine and any applicable EXTRA.DATs are installed. 3) Run a full system scan. (On-Demand Scan) 4) Reboot, as soon as it is convenient, to ensure all malicious components are removed. Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Malware
  • Essay about Mobile Malware
  • the top 5 malwares Essay
  • Malware and Spyware Essay
  • Computer Malware Essay
  • Malware, Spyware & Adware Essay
  • Malware and Its Effects on Privacy and Security Essay
  • Report on Malware Detection Techniques Research Paper

Become a StudyMode Member

Sign Up - It's Free