Difference between pages "Lee Whitfield" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
 
Line 1: Line 1:
[[File:LeeW.jpg|200px|thumb|right|Lee W]] Before becoming involved in the field of digital forensics Lee worked for an international construction law company working directly under the director responsible for forensic construction. Lee's passion for computers caused him to enrol in the first Computing (Forensics) degree at the University of Central Lancashire in Preston. Graduating three years later Lee started his first job in digital forensics. It was here that he gained a good grounding in the field.
+
'''Malware''' is a short version of '''Malicious Software'''.
After two years he moved to join his brother, Simon, at Zentek Forensics. Lee worked as the lab manager and was directly responsible for all computer examinations performed at Zentek.
+
Lee now works at Disklabs where he supervises all computer investigations.
+
Lee has now worked in the field for over five years and has conducted over 250 investigations and has experience in cases involving child abuse, rape, attempted murder, fraud, intellectual property theft, burglary, and so on.
+
Lee is also the creator of the [http://www.forensic4cast.com Forensic 4cast] podcast and the [http://www.forensic4cast.com/forensic-4cast-awards/ Forensic 4cast Awards].
+
  
[[Category:People]]
+
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
 +
 
 +
== Virus ==
 +
A computer program that can automatically copy itself and infect a computer.
 +
 
 +
== Worm ==
 +
A self-replicating computer program that can automatically infect computers on a network.
 +
 
 +
== Trojan horse ==
 +
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
 +
 
 +
== Spyware ==
 +
A computer program that can automatically intercept or take partial control over the user's interaction.
 +
 
 +
== Exploit Kit ==
 +
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
 +
 
 +
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
 +
 
 +
== See Also ==
 +
 
 +
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
 +
 
 +
=== Exploit Kit ===
 +
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
 +
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard on July 2, 2013
 +
 
 +
[[Category:Malware]]

Revision as of 01:05, 21 October 2013

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

See Also

External Links

Exploit Kit