{"id":4404,"date":"2020-10-30T22:37:28","date_gmt":"2020-10-30T21:37:28","guid":{"rendered":"https:\/\/webhosting.de\/?p=4404"},"modified":"2020-10-30T22:37:28","modified_gmt":"2020-10-30T21:37:28","slug":"further-classifications-of-malware-ransomware-spyware-adware-scarewar-phishing-keylogger","status":"publish","type":"post","link":"https:\/\/webhosting.de\/da\/weitere-klassifizierungen-von-malware-ransomware-spyware-adware-scarewar-phishing-keylogger\/","title":{"rendered":"Yderligere klassifikationer af malware"},"content":{"rendered":"<p>Der findes mange forskellige typer malware, alle med forskellige funktioner og m\u00e5l. Nogle skader er bare irriterende - andre kan have alvorlige \u00f8konomiske konsekvenser. Det er ikke ualmindeligt, at malware har flere funktioner eller m\u00e5der at f\u00e5 adgang til din computer p\u00e5. Men al malware har \u00e9t m\u00e5l: at skade brugeren.<\/p>\n<h2>Adware - Udmattende og irriterende<\/h2>\n<p>Adware, ofte kaldet bloatware, installeres i baggrunden p\u00e5 pc'en og omdirigerer brugeren til reklamesider. Den er ofte ogs\u00e5 ansvarlig for irriterende pop-ups og reklamer, som \u00e5bnes konstant og uopfordret. Bloatware omfatter ogs\u00e5 programmer eller applikationer, der installeres sammen med software, som faktisk er \u00f8nsket. Generelt er adware en af de mere uskadelige trusler p\u00e5 internettet, men de u\u00f8nskede reklamesider kan omdirigere dig til andre usikre websteder, som derefter installerer v\u00e6rre malware. Derfor b\u00f8r adware ogs\u00e5 afinstalleres, s\u00e5 snart det er opdaget. Du kan selv forhindre installation af bloatware ved altid at s\u00f8rge for, at der ikke installeres yderligere programmer, n\u00e5r du installerer ny software.<\/p>\n<h2>Keylogger - alle tastetryk registreres<\/h2>\n<p>Keylogging har faktisk sin oprindelse i lovlig overv\u00e5gning i it-sektoren. Der installeres den enten som software eller hardware og registrerer p\u00e5lideligt alle tastetryk. I malware-sektoren optr\u00e6der en keylogger altid som software, der uopdaget installeres i baggrunden og derefter registrerer alle input via tastaturet. Disse indtastninger videresendes derefter til \"afsenderen\" af malware, og det er her, faren ligger: Alle indtastede adgangskoder, finansielle data, kreditkortnumre og pinkoder er nu i h\u00e6nderne p\u00e5 afsenderen. Det er nemt for ham at bruge e-mail-kontoen, netbankoplysninger eller andre fortrolige data til kriminelle form\u00e5l. Keyloggere er blandt de farligste malware, fordi de potentielt kan for\u00e5rsage stor skade og kan v\u00e6re sv\u00e6re at opdage. Den kan forkl\u00e6de sig som en normal fil, eventuelt genopbygge sig selv og <a href=\"https:\/\/webhosting.de\/da\/existenzgruendung-online-chancen-und-stolpersteine\/\">uafh\u00e6ngig<\/a> installeres og for\u00e5rsager sj\u00e6ldent problemer med pc'en, f.eks. ryk eller et langsomt system.<\/p>\n<h2>Scareware<\/h2>\n<p>Scareware fors\u00f8ger, som navnet antyder, at skr\u00e6mme eller skr\u00e6mme brugeren. Det sker ved, at der pludselig dukker en pop-up eller et reklamevindue op, som rapporterer om et p\u00e5st\u00e5et pc-problem. Disse advarsler sp\u00e6nder fra en p\u00e5st\u00e5et virusinfektion til problemer med operativsystemet eller manglende vigtige programkomponenter. Advarslen har til form\u00e5l at skr\u00e6mme brugeren til enten at k\u00f8be software, der angiveligt skal l\u00f8se problemet, eller downloade et nyttigt program. Denne software indeholder ofte malware, og n\u00e5r brugerne k\u00f8ber software, afsl\u00f8rer de ofte f\u00f8lsomme oplysninger om sig selv. Scareware kan leveres enten via pop-ups, sider eller via e-mail. <a href=\"https:\/\/webhosting.de\/da\/srs-mit-postfix-unter-centos\/\">Spam<\/a> formidles.<\/p>\n<p><a href=\"https:\/\/webhosting.de\/wp-content\/uploads\/2017\/08\/spectre-webhosting.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-3249 alignright\" src=\"https:\/\/webhosting.de\/wp-content\/uploads\/2017\/08\/spectre-webhosting.jpg\" alt=\" bredde=\"472\" height=\"285\" \/><\/a><\/p>\n<h2>Spyware<\/h2>\n<p>Spyware udspionerer ens computer p\u00e5 en s\u00e5dan m\u00e5de, at svindleren har forskellige muligheder for derefter at bruge den til kriminelle form\u00e5l. Spyware kan f.eks. forkl\u00e6de sig som en browserbar eller \u00e6ndre brugerens startside. Disse bruges derefter til at registrere og analysere brugerens adf\u00e6rd p\u00e5 WorldWideWeb. Nogle gange kan spyware lamme visse funktioner p\u00e5 computeren, f.eks. ved at fjerne administratorrettigheder eller skabe sikkerhedshuller i ens eget system, hvilket s\u00e5 fungerer som en sluse for yderligere malware.<\/p>\n<h2>Phishing<\/h2>\n<p><a href=\"https:\/\/webhosting.de\/da\/spoofing-pharming-und-phishing-betrugsgefahren-im-internet\/\">Phishing<\/a> henviser til \"fiskeri\" efter f\u00f8lsomme data, f.eks. bank- eller kreditkortoplysninger. Det farlige ved phishing er, at ens egen computer ikke beh\u00f8ver at v\u00e6re inficeret - brugeren er m\u00e5ske bare ikke opm\u00e6rksom nok. Phishing leder brugeren til et falsk websted, hvor han eller hun intetanende indtaster sine data. Det kan v\u00e6re adgangskoder eller finansielle data. Phishing starter normalt fra brugerens egen e-mail-konto. Brugeren modtager en falsk e-mail fra en kendt virksomhed eller bank, hvor han bliver bedt om at logge ind igen eller bekr\u00e6fte visse data. N\u00e5r brugeren klikker p\u00e5 linket, omdirigeres han\/hun til en falsk side, og n\u00e5r han\/hun indtaster data, videregiver han\/hun dem til svindlerne.<\/p>\n<h2>Ransomware<\/h2>\n<p>Ransomware beder brugeren om at betale en \"l\u00f8sesum\", efter at computeren er blevet inficeret, for at f\u00e5 pc'en til at fungere igen. Svindlerne \"l\u00e5ser\" computeren med malware og viser derefter en stor advarselsmeddelelse og beder om betaling af et bestemt bel\u00f8b for at f\u00e5 computeren til at fungere igen.<\/p>","protected":false},"excerpt":{"rendered":"<p>Es gibt die verschiedensten Arten von Malware, alle mit verschiedenen Funktionsweisen und Zielen. Dabei ist so mancher Schaden nur nervig &#8211; andere dagegen k\u00f6nnen ernsthafte, finanzielle Folgen nach sich ziehen. Nicht selten hat Malware auch mehrere Funktionen oder M\u00f6glichkeiten, Zugang zum eigenen Computer zu finden. Ein Ziel aber hat jede Malware: Sie schaden dem Nutzer. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[673,794],"tags":[418,419,164,420,421,422],"class_list":["post-4404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer_und_internet","category-sicherheit-computer_und_internet","tag-adware","tag-keylogger","tag-phishing","tag-ransomware","tag-scarewar","tag-spyware"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":null,"rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":"","_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":null,"_edit_lock":null,"_oembed_e7b913c6c84084ed9702cb4feb012ddd":null,"_oembed_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_03514b67990db061d7c4672de26dc514":null,"_oembed_time_03514b67990db061d7c4672de26dc514":null,"rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4423","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"further-classifications-of-malware-ransomware-spyware-adware-scarewar-phishing-keylogger","_trp_automatically_translated_slug_lv":"talak-klasifikacija-malware-ransomware-spyware-adware-scarewar-phishing-keylogger","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"further-classifications-of-malware-ransomware-spyware-adware-scarewar-phishing-keylogger","_trp_automatically_translated_slug_ja":"%e3%83%9e%e3%83%ab%e3%82%a6%e3%82%a7%e3%82%a2%e3%83%bb%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%83%bb%e3%82%b9%e3%83%91%e3%82%a4%e3%82%a6%e3%82%a7%e3%82%a2%e3%83%bb%e3%82%a2","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":null,"_oembed_time_81002f7ee3604f645db4ebcfd1912acf":null,"_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"797","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":["weitere klassifizierungen von malware"],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"","_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"1222","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/posts\/4404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/comments?post=4404"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/posts\/4404\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/media\/1222"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/media?parent=4404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/categories?post=4404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/da\/wp-json\/wp\/v2\/tags?post=4404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}