Viruses, Hardware and Software Trojans
Viruses
Malicious programs that attach themselves to legitimate files or applications and replicate when executed, often causing data corruption, system damage, or unauthorized actions.
Software Trojans
Malicious software disguised as legitimate applications. Once installed, they can create backdoors, steal data, log keystrokes, or give attackers remote access to the system.
Hardware Trojans
Malicious modifications embedded into physical hardware components (such as chips, firmware, or peripherals). These can leak sensitive data, bypass security controls, or allow persistent, hard-to-detect attacks.
#malwareanalysis #SecurityAwareness