Skip to main content

Learn About Malware Menaces (Viruses, Spyware, Botnets & More) - Knowledgebase / Security / Antivirus and Malware - OIT Service Center

Learn About Malware Menaces (Viruses, Spyware, Botnets & More)

Authors list

Malware ("malicious software") -- spyware, bogus anti-virus apps, rogueware, viruses, scareware, trojan horses, worms, etc.-- is lurking everywhere. Hackers and their botnets are constantly rattling virtual doors looking for easy prey. If you become infected, all sorts of unpleasant things can happen to make your life miserable, including a hacker taking control of your computer as well as your identity.

What Can You Do?

First, "Know Thy Enemy"

  • Botnet: A network of compromised computers, each acting as a robot (or bot) under the control of a remote user. Often used to send out spam and phishing emails. More background in Botnet 101: Don't Get Own3d!
  • Spyware: An annoying, intrusive, and sometimes offensive program that allows some to covertly gather your information through your Internet connection, often for advertising purposes. Read more in the SANS' documents Advances in Spyware (SANS document) and Top 15 Malicious Spyware Actions.
  • Virus: A program that can copy itself, attach itself to other programs or files, and perform unwanted and unauthorized tasks. May not be easily detected and can be widely spread through the sharing of files, memory devices or email.
  • Worm: A computer program that can run independently, cloning itself onto other computers connected to a network. Known to consume computer resources destructively.

Second, Protect Yourself

  • Keep your computer's OS and software current. Configure your computer to update its operating system automatically. Accept application updates when offered.
  • Protect your computer with an approved anti-malware app. Brown provides comprehensive anti-malware protection, free of charge.
  • Look out for bogus antivirus software, which could clandestinely disable any real product, redirect computing resources to it, put your data and privacy at risk, and be nearly impossible to remove.
  • Install software, such as Ad-Aware or Spybot Search & Destroy or Malwarebytes, that detect and remove threats. The IT Service Center is only suggesting the use of this software and is only meant to be run on personal, non-Brown devices.

Third, How to Recover from a Compromise

Fourth, Keep an Eye Out for Threats

Helpful Unhelpful

77 of 180 people found this page helpful

Send us a note about this article

Contact the OIT Service Center

Phone: 401-863-4357

Email: help@brown.edu

Location: Page Robinson Hall - 69 Brown St., Room 510

See our availability

https://it.brown.edu/get-help

Walk-ins Welcome! Appointments recommended.

For reserved service for a technical consult or a loaner check-out, you can schedule an appointment here.