Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Internet
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Malware=== [[Malware]] is malicious software used and distributed via the Internet. It includes [[computer virus]]es which are copied with the help of humans, [[computer worm]]s which copy themselves automatically, software for [[denial of service attack]]s, [[ransomware]], [[botnet]]s, and [[spyware]] that reports on the activity and typing of users. Usually, these activities constitute [[cybercrime]]. Defense theorists have also speculated about the possibilities of [[hackers]] using [[cyber warfare]] using similar methods on a large scale.<ref>{{Cite web|last=Andriole|first=Steve|title=Cyberwarfare Will Explode In 2020 (Because It's Cheap, Easy And Effective)|url=https://www.forbes.com/sites/steveandriole/2020/01/14/cyberwarfare-will-explode-in-2020-because-its-cheap-easy--effective/ |date=Jan 14, 2020 |access-date=2021-05-18|website=Forbes|language=en}}</ref> Malware poses serious problems to individuals and businesses on the Internet.<ref>{{Cite journal |last1=Kim |first1=Jin-Young |last2=Bu |first2=Seok-Jun |last3=Cho |first3=Sung-Bae |date=2018-09-01 |title=Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders |url=http://sclab.yonsei.ac.kr/publications/Papers/IJ/2018_IS_JYK.pdf |s2cid-access=free |via=Soft Computing Laboratory, Dept. of Computer Science, Yonsei University |journal=Information Sciences |language=en |volume=460β461 |pages=83β102 |doi=10.1016/j.ins.2018.04.092 |issn=0020-0255 |s2cid=51882216 |access-date=2 December 2021 |url-status=dead |archive-url= https://web.archive.org/web/20220430072512/http://sclab.yonsei.ac.kr/publications/Papers/IJ/2018_IS_JYK.pdf |archive-date= Apr 30, 2022 }}</ref><ref>{{Cite journal |last1=Razak |first1=Mohd Faizal Ab |last2=Anuar |first2=Nor Badrul |last3=Salleh |first3=Rosli |last4=Firdaus |first4=Ahmad |date=2016-11-01 |title=The rise of "malware": Bibliometric analysis of malware study |url=https://linkinghub.elsevier.com/retrieve/pii/S1084804516301904 |journal=Journal of Network and Computer Applications |language=en |volume=75 |pages=58β76 |doi=10.1016/j.jnca.2016.08.022 |access-date=30 April 2022|url-access=subscription }}</ref> According to [[NortonLifeLock|Symantec]]'s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.<ref>{{Cite journal |last1=Xiao |first1=Fei |last2=Sun |first2=Yi |last3=Du |first3=Donggao |last4=Li |first4=Xuelei |last5=Luo |first5=Min |date=2020-03-21 |title=A Novel Malware Classification Method Based on Crucial Behavior |journal=Mathematical Problems in Engineering |volume=2020 |pages=1β12 |doi=10.1155/2020/6804290 |issn=1024-123X |doi-access=free}}</ref> [[Cybercrime]], which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy US$6 trillion in 2021, and is increasing at a rate of 15% per year.<ref name="Morgan">{{cite web |last=Morgan |first=Steve |date=13 November 2020 |title=Cybercrime To Cost The World $10.5 Trillion Annually By 2025 |url=https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ |url-status=live |archive-url=https://web.archive.org/web/20220305072352/https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ |archive-date=5 March 2022 |access-date=5 March 2022 |work=Cybercrime magazine website |publisher=Cybersecurity ventures |format= |doi=}}</ref> Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the [[Electricity infrastructure|electricity distribution network]].<ref>{{Cite journal |last1=Eder-Neuhauser |first1=Peter |last2=Zseby |first2=Tanja |last3=Fabini |first3=Joachim |date=2019-06-01 |title=Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types |journal=Journal of Computer Virology and Hacking Techniques |language=en |volume=15 |issue=2 |pages=109β125 |doi=10.1007/s11416-018-0325-y |issn=2263-8733 |s2cid=255164530 |doi-access=free}}</ref><ref>{{Cite journal |last1=Razak |first1=Mohd Faizal Ab |last2=Anuar |first2=Nor Badrul |last3=Salleh |first3=Rosli |last4=Firdaus |first4=Ahmad |date=2016-11-01 |title=The rise of "malware": Bibliometric analysis of malware study |url=https://www.sciencedirect.com/science/article/pii/S1084804516301904 |journal=Journal of Network and Computer Applications |volume=75 |pages=58β76 |doi=10.1016/j.jnca.2016.08.022 |issn=1084-8045|url-access=subscription }}</ref> Malware can be designed to evade antivirus software detection algorithms.<ref>{{Cite web |last=Spring |first=Tom |date=2023-06-12 |title=Obfuscation tool 'BatCloak' can evade 80% of AV engines |url=https://www.scmagazine.com/news/obfuscation-batcloak-80-percent-av-engines |access-date=2023-12-21 |website=SC Media |language=en}}</ref><ref>{{Cite web |last=Nam |first=Nguyen |date=2023-01-10 |title=Kiα»m tra ip |url=http://kiemtraip.vn |access-date=2023-12-21 |language=en-US}}</ref><ref>{{Cite web |last=Amos |first=Zac |title=How Ransomware Can Evade Antivirus Software |url=https://gca.isa.org/blog/how-ransomware-can-evade-antivirus-software |access-date=2023-12-21 |website=gca.isa.org |language=en}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)