Abstract:As long as we have software or applications, we would have malwares. Malwares are installed into our computers to utilize our computing resources sneakily or to confirm unauthorized access of informat...As long as we have software or applications, we would have malwares. Malwares are installed into our computers to utilize our computing resources sneakily or to confirm unauthorized access of information. In this paper, we present what malware is and the objectives behind it. Additionally, how malware began and a brief history of their evolution, the different forms of malware are discussed. We also examined the news coverage of recent malware attacks that were big. To Segway into the next topic, we made up a fictious attack to transition. Then we discussed how a person can get malware, the signs of malware, how to get rid of it, and how to protect oneself from it. The paper ends by a discussion about differences between two most popular ani-malware software's.Read More
Publication Year: 2022
Publication Date: 2022-05-19
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 7
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot