Barkings! | The Small Dog Apple Blog

A blog about our business, our industry, and our lives. You'll find posts from everyone at Small Dog and if the dogs could blog, they'd be here, too!

(RSS) and (ATOM)

Worms, Viruses, and Trojans, Oh My!

malware virus trojan

You have probably heard the terms “viruses, trojans and worms,” which are all under the umbrella term for malicious software called malware. These items are usually thought of as interchangeable or the same thing. Although they are similar in that they are created with malicious intent, if you understand the differences, you will better be able to better understand the threat so you can protect your Mac.

Like a virus that infects people, a computer virus seeks to replicate itself and spread to another host to repeat the process. Since they need execute and write permissions for this, viruses attach themselves to programs (sometimes legitimate) so that when you open the host program the virus is also activated. There are a couple of subclasses of viruses, but they have the same basic characteristics.

A worm is very similar to a virus, but it can travel between other computers or devices without interaction from any user. Also unlike a virus, a worm does not need to attach itself to an existing program. One of the most famous worms was Stuxnet. Stuxnet was created by a unknown source and its main target was a nuclear power facility in Iran. It could spread from a computer to a flash drive and then to a phone and back to a computer (and so on) until it found its target. Even though this is the most advanced worm to date, a common malicious computer worm can do the same traveling to infect machines.

The word trojan rises from the way this type of malware works. Similar to Greek mythology, the user is tricked into installing the trojan horse which is often disguised as friendly software. The effect of a trojan horse can vary, depending on the creator’s intention. The most recent well-known trojan for the Mac is “Flashback,” which disguised itself as an Adobe Flash Player update. Once installed, it would be able to collect user data and passwords and make them accessible to the creator of the trojan. It could also set up a BotNet which is a network of computers to attack other machines and services.

So what does this mean for us as Mac users? It has long been one of the points in the Windows/Mac debate that Macs are immune to viruses and malware. It would be more true to say that there are currently no virus threats to Macs. As far as other forms of malware, we have all seen that certainly any machine can be a victim. Certainly though, as Mac users we only deal with a small fraction of the headaches that Windows users have with this problem.

The bottom line is to both be careful and pragmatic — as time goes on, the number of threats is guaranteed to rise. Use a malware program — either one of the paid options, such as Norton or MacAfee, or one of the free utilities out there that performs well and seems to have minimal impact on system performance such as Sophos and Clam XAV.

post this at del.icio.uspost this at Diggpost this at Newsvinepost this at Redditpost this at TailRank

Back to Barkings!
Previous Post:
Next Post:

  1. I have used Norton, McAfee, and CA. To date, CA is the best. The full subscription version has Anti-Virus, Anti-Spyware, Anti-Pop-Up, and a fully functioning firewall and mail scanner.


    click here to read    2012-11-09 00:43    #
  2. My computer crashed two weeks ago while I was visiting my family in Margate, Florida. I needed a reliable company to fix my PC and fix it fast. My cousin recommended Data Ninja services and they were, without a doubt, a life saver. Thanks to Data Ninja Services, my PC was fixed in no time and is running like new. Check them out at www.dataninjaservices.com or call Mike at (954) 801-3300.


    — cybersally    2012-11-20 23:10    #
  3. most people who dial into the Internet almost always get a different IP Address each and every time they connect into the Internet. so do not think an IP Address is fixed for a person. they are usually only generalized and best used against a person while the person is online.


    check these guys out    2012-11-24 00:58    #
  Textile Help