This 35-second video offers a concise overview of the Trojan, Ransomware and Keylogger Now, let’s dive into these concepts to better understand how they pose risks to our digital security.
Trojan

- Trojan malware, also known as a Trojan Horse, is a type of malicious software that disguises itself as a legitimate program. While it appears to perform a legit function, it actually carries out harmful actions on your computer.
- CK Explanation: Basically, it masquerades as a legitimate program, but in reality, it’s harmful (or has a negative impact).
Ransomware

Adware
- Ransomware: is an ever-evolving form of malware designed to encrypt files (make it unreadible) on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption (make it readable). Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. In recent months, ransomware has dominated the headlines, but incidents among the Nation’s state, local, tribal, and territorial (SLTT) government entities and critical infrastructure organizations have been growing for years.
- CK Explanation: Simply locks your computer and demanding money for unlock key
Keylogger

- Keylooger: a tool that record what a person types on a device
- CK Explanation: Simply monitor your keystroke
What are some tips to avoid Malware and lessen their impact?
- Install anti-virus software from a reputable vendor (at your home, probably Windows Defender can be a great choice for a free version). Update it and use it regularly.
- In addition to scanning for viruses on a regular basis, install an “on access” scanner (included in most anti-virus software packages) and configure it to start each time you start up your computer. This will protect your system by checking for viruses each time you run an executable file.
- Use a virus scan before opening any new programs or files containing executable code. This includes packaged software that you buy from the store as well as any program you might download from the Internet.
- If you are a member of an online community or chat room, be very careful about accepting files or clicking links that you find or that people send you within the community.
- Make sure you back up your data (documents, bookmark files, important email messages, etc.) on disc so that you do not lose valuable work in the event of a virus infection.
Blog
From Our Blog
Learn about OSI Model
This blog, we will shortly discuss The Open Systems Interconnection Model (OSI...
Navigating the Depths: Exploring the Surface, Deep, and Dark Web
The internet is like a big iceberg floating in the sea. You see only a bit of...
Cybersecurity 101: Phishing, Spear Phishing, and Whaling
Think of the internet as a huge playground where we all hang out. But just...
CK Cyber
To empower you with the knowledge for cybersecurity to protect the cyber-world.
Contact
CK Cyber all rights reserved © 2025