Malware can be introduced into a system or network in the form of a virus, a worm, spyware, a Trojan horse, adware or ransomware.
It is any malicious program that could potentially impact an organization’s privacy and security.

An example currently discussed almost daily in the news involves John Podesta, the campaign director for U.S.

Democratic presidential candidate Hillary Clinton.

Apparently it was Podesta’s misfortune to click onto a phishing website that released malware into his PC, enabling hackers to access all his private emails.

These emails ended up in the hands of Wikileaks, which is releasing thousands of them per day for political reasons. Unfortunately, sophisticated cyber-criminals are refining their strategies constantly, deploying advanced malware able to bypass traditional security solutions to enter corporate networks undetected.
Security industry analysts have reported that malware is downloaded into enterprise settings every 81 seconds.

This makes it imperative for security managers to be aware of the techniques being used to hide malware.

This eWEEK slide show, with industry information from Peter Ewane, a security researcher at AlienVault, examines some of the most common hiding places for malware.

Leave a Reply