Home Search Center Intelligent Model Selection IP Encyclopedia

What Is Malware?

Malware refers to computer code or software that is installed and run on a user's computer or other terminals without the user being aware or granting permission. It is designed to perform malicious activities that infringe on the legitimate rights and interests of users. Such activities include data theft, encryption, modification, deletion, and monitoring. By taking preventive measures to improve users' awareness of prevention, the probability of being attacked by malicious software can be effectively reduced, thereby reducing the subsequent loss.

Types of Malware

Malware includes viruses, worms, Trojan horses, ransomware, spyware, and adware. Different types of malware have different attack modes and may cause varying degrees of damage. The different types are described as follows.

  • Virus: A virus is attached to another program and activated only when a user opens the program. Generally, a virus replicates itself by modifying other computer programs and inserting its own code into those programs to "infect" other files. Viruses are usually included as an attachment in a malicious email.
  • Worm: A worm replicates itself automatically without operations. Once a worm infects a system, it typically exploits security vulnerabilities in software or operating systems to propagate itself from one machine to another in order to quickly infect the entire network.
  • Trojan horse: A Trojan horse pretends to be harmless in order to trick users into downloading and installing it. A successful Trojan horse will run in the background secretly.
  • Ransomware: Ransomware locks victims' computers or systematically encrypts files on the victims' hard disks until a ransom is paid. Ransomware is often spread through emails that contain malicious attachments or through file downloading.
  • Spyware: Spyware usually operates without the user's knowledge as a type of hidden malware. Spyware includes keyloggers that record anything entered by users, including open web pages, emails, and programs.
  • Adware: Adware collects users' browser history and download records so that advertisers can push advertisements to users more accurately. Generally, a user clicks an advertisement to install malicious software on the computer.

What Are the Signs that Malware May Be Present?

Signs of Malware on Computers

If the following symptoms occur, malware may exist on the computer. In this case, you need to respond quickly and carefully.
  • The operating system fails to start normally or operates slowly.
  • The computer often breaks down or restarts suddenly.
  • The disk storage space is insufficient.
  • A program cannot run properly or exits unexpectedly.
  • Advertisements are frequently displayed.
  • Files get lost or damaged, or new files appear unexpectedly.
  • Unnecessary tools or programs appear on the computer.
  • The computer has an infection warning and a ransom needs to be paid to regain access to the data.

Signs of Malware on Mobile Devices

If the following symptoms occur, malware may exist on the mobile device. In this case, you need to respond quickly and carefully.
  • An application cannot run properly or runs slowly.
  • Pop-up windows are frequently displayed.
  • The mobile device is overheated and the battery life suddenly becomes shorter.
  • The device cannot be shut down or restarted.
  • Suspicious applications appear.

How to Protect Against Malware?

Anti-Malware Methods for Computers

  • Install protection software and keep it up to date.
  • Enhance security awareness. Avoid accessing unknown websites, clicking unknown links or suspicious pop-up windows, downloading suspicious files, or opening attachments from unknown email addresses.
  • Periodically back up data to minimize the impact of data loss.
  • Use protection software or manually delete malicious software from the computer.

Anti-Malware Methods for Mobile Devices

  • Install a protection application.
  • Use secure Wi-Fi and download applications only from official app stores.
  • Enhance security awareness. Avoid accessing unknown websites, clicking suspicious links, or downloading suspicious files or applications.
  • Periodically back up data.
  • Use protection apps to scan mobile devices, clear browsing history and data, and delete suspicious applications or malware.

How Does Huawei Help You Defend Against Malware?

As the network environment becomes more intricate and the prevalence of malware continues to rise, Huawei provides various security solutions and products to help you quickly detect security risks and reduce the impact of security threats.

  • HiSec Insight Security Situational Awareness System

    HiSec Insight can detect emails containing malicious attachments based on Internet access traffic and quickly block and contain detected attacks by interworking with devices.

  • HiSecEngine USG6000E/6000F Series AI Firewalls

    HiSecEngine USG6000E/6000F series AI firewalls help you implement strict control on inbound and outbound traffic to defend against intranet and extranet threats. With content security functions such as application identification, IPS, antivirus, URL filtering, and mail filtering, the USG series AI firewalls can effectively block malware to protect servers and users on the intranet from threats. In addition, these firewalls can quickly obtain the latest threat information, accurately detect and defend against vulnerability-based attacks, and defend against various web-based attacks.

  • FireHunter6000 Series Sandbox

    The FireHunter can accurately identify unknown malicious file penetration and Command & Control (C&C) connections. By restoring files from the network traffic and analyzing them in a virtual environment, the FireHunter can detect and defend against unknown malicious files.

About This Topic
  • Author: Xie Saiyu
  • Updated on: 2023-07-18
  • Views: 1821
  • Average rating:
Share link to