Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Malware attack

Malware attack is to exploit vulnerabilities in a computer system or network in order to


gain unauthorized access and carry out malicious activities.

This can include:-

 Stealing sensitive information,

 Encrypt the files and

 Disrupting system operations or using the compromised system to launch


additional attacks.

How malwares got on your system:-

 Phishing emails Malware can be delivered through email attachments or links in


phishing emails that appear to be from a legitimate source.

 Software downloads Downloading software or files from untrustworthy sources


can result in malware being installed alongside the intended program.

 Removable media Malware can be spread through infected USB drives, external
hard drives, or other removable media devices.

 Infected websites Visiting malicious websites or clicking on deceptive pop-up


ads can lead to malware being downloaded onto your system without your
knowledge.

It is crucial for individuals and organizations to implement robust security measures to


protect against malware attacks, such as using:-

 Antivirus software,

 Keeping systems updated and

 Practicing safe browsing and email habits.

You might also like