mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 17:27:23 +00:00
Updates
This commit is contained in:
parent
1da97b19c1
commit
f8b9e92a78
@ -11,12 +11,15 @@ author: dansimp
|
|||||||
ms.date: 07/01/2018
|
ms.date: 07/01/2018
|
||||||
---
|
---
|
||||||
# Understand malware
|
# Understand malware
|
||||||
|
|
||||||
Malware is a term used to describe malicious applications and code that can cause damage and disrupt normal use of devices. Malware can allow unauthorized access, use system resources, steal passwords, lock you out of your computer and ask for ransom, and more.
|
Malware is a term used to describe malicious applications and code that can cause damage and disrupt normal use of devices. Malware can allow unauthorized access, use system resources, steal passwords, lock you out of your computer and ask for ransom, and more.
|
||||||
|
|
||||||
Cybercriminals that distribute malware are often motivated by money and will use infected computers to launch attacks, obtain banking credentials, collect information that can be sold, sell access to computing resources, or extort payment from victims.
|
Cybercriminals that distribute malware are often motivated by money and will use infected computers to launch attacks, obtain banking credentials, collect information that can be sold, sell access to computing resources, or extort payment from victims.
|
||||||
|
|
||||||
As criminals become more sophisticated with their attacks, Microsoft is here to help. Windows 10 is the most secure version of Windows yet and includes many features to help protect you whether you're at home, at work, or on the go. Businesses can trust in the next-generation capabilities of our security features to ensure they stay protected.
|
As criminals become more sophisticated with their attacks, Microsoft is here to help. Windows 10 is the most secure version of Windows yet and includes many features to help protect you whether you're at home, at work, or on the go. Businesses can trust in the next-generation capabilities of our security features to ensure they stay protected.
|
||||||
|
|
||||||
|
For good general tips, check out the [prevent malware infection](prevent-malware-infection.md) topic.
|
||||||
|
|
||||||
There are many types of malware, including:
|
There are many types of malware, including:
|
||||||
|
|
||||||
- [Coin miners](coinminer-malware.md)
|
- [Coin miners](coinminer-malware.md)
|
||||||
|
@ -32,11 +32,11 @@ However, in recent versions of Microsoft Office, macros are disabled by default.
|
|||||||
|
|
||||||
We've seen macro malware download threats from the following families:
|
We've seen macro malware download threats from the following families:
|
||||||
|
|
||||||
- Ransom:MSIL/Swappa
|
- [Ransom:MSIL/Swappa](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Ransom:MSIL/Swappa.A)
|
||||||
- Ransom:Win32/Teerac
|
- [Ransom:Win32/Teerac](Ransom:Win32/Teerac)
|
||||||
- TrojanDownloader:Win32/Chanitor
|
- [TrojanDownloader:Win32/Chanitor](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader:Win32/Chanitor.A)
|
||||||
- TrojanSpy:Win32/Ursnif
|
- [TrojanSpy:Win32/Ursnif](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=TrojanSpy:Win32/Ursnif)
|
||||||
- Win32/Fynloski
|
- [Win32/Fynloski](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/Fynloski)
|
||||||
- [Worm:Win32/Gamarue](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Win32/Gamarue)
|
- [Worm:Win32/Gamarue](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Win32/Gamarue)
|
||||||
|
|
||||||
## How to protect against macro malware
|
## How to protect against macro malware
|
||||||
|
@ -12,7 +12,7 @@ ms.date: 07/12/2018
|
|||||||
---
|
---
|
||||||
# Prevent malware infection
|
# Prevent malware infection
|
||||||
|
|
||||||
Malware authors are always looking for new ways to infect computers. Follow the simple tips below to stay protected and minimize threats to your data and accounts.
|
Malware authors are always looking for new ways to infect computers. Follow the simple tips below to stay protected and minimize threats to your data and accounts.
|
||||||
|
|
||||||
You can also browse the many [software and application solutions](https://review.docs.microsoft.com/en-us/windows/security/intelligence/prevent-malware-infection?branch=wdsi-migration-stuff#software-solutions) available to you.
|
You can also browse the many [software and application solutions](https://review.docs.microsoft.com/en-us/windows/security/intelligence/prevent-malware-infection?branch=wdsi-migration-stuff#software-solutions) available to you.
|
||||||
|
|
||||||
@ -108,7 +108,7 @@ Microsoft provides comprehensive security capabilities that help protect against
|
|||||||
|
|
||||||
### Earlier than Windows 10 (not recommended)
|
### Earlier than Windows 10 (not recommended)
|
||||||
|
|
||||||
* [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) provides real-time protection for your home or small business PC that guards against viruses, spyware, and other malicious software. For Windows 7, Windows Vista. See Windows Defender Advanced Threat Protection for later versions of Windows.
|
* [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) provides real-time protection for your home or small business PC that guards against viruses, spyware, and other malicious software.
|
||||||
|
|
||||||
## What to do with a malware infection
|
## What to do with a malware infection
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Scammers might also initiate contact by displaying fake error messages on websit
|
|||||||
|
|
||||||
When you engage with the scammers, they can offer fake solutions for your “problems” and ask for payment in the form of a one-time fee or subscription to a purported support service.
|
When you engage with the scammers, they can offer fake solutions for your “problems” and ask for payment in the form of a one-time fee or subscription to a purported support service.
|
||||||
|
|
||||||
**For more information and to view known tech support scam numbers and popular web scams**, see https://support.microsoft.com/en-us/help/4013405/windows-protect-from-tech-support-scams
|
**For more information, view [known tech support scam numbers and popular web scams](https://support.microsoft.com/en-us/help/4013405/windows-protect-from-tech-support-scams).**
|
||||||
|
|
||||||
## How to protect against tech support scams
|
## How to protect against tech support scams
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user