From the course: Wireshark: Malware and Forensics

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding malware and cyber threats

Understanding malware and cyber threats - Wireshark Tutorial

From the course: Wireshark: Malware and Forensics

Start my 1-month free trial

Understanding malware and cyber threats

- [Narrator] Over the years, hackers have written and modified many programs, all designed to get in and manipulate a system. Malware has improved in sophistication, and attacks are organized and coordinated. Serious malware makers have progressed to more aggressive attacks, using Trojan horses, root kits, and spyware. Most methods involve programming, yet Some involve social engineering. Expert hackers, target unprotected systems, and may even benefit from accessing an outdated operating system. That is because, even with all the recent news and cyber threats, many are slow to adopt the latest in technology, security patches, updates and operating systems. Let's compare some of the different types of malware. A virus alters the way a computer operates, and can self-replicate and spread to other programs within the system. A virus must have a way to travel to another host, such as an email attachment. A worm is a…

Contents