This 35-second video offers a concise overview of the Trojan, Ransomware and Keylogger Now, let’s dive into these concepts to better understand how they pose risks to our digital security.

Trojan

  • Trojan malware, also known as a Trojan Horse, is a type of malicious software that disguises itself as a legitimate program. While it appears to perform a legit function, it actually carries out harmful actions on your computer.
  • CK Explanation: Basically, it masquerades as a legitimate program, but in reality, it’s harmful (or has a negative impact).

Ransomware

Adware

  • Ransomware: is an ever-evolving form of malware designed to encrypt files (make it unreadible) on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption (make it readable). Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. In recent months, ransomware has dominated the headlines, but incidents among the Nation’s state, local, tribal, and territorial (SLTT) government entities and critical infrastructure organizations have been growing for years.
  • CK Explanation: Simply locks your computer and demanding money for unlock key

Keylogger

  • Keylooger: a tool that record what a person types on a device
  • CK Explanation: Simply monitor your keystroke

 

What are some tips to avoid Malware and lessen their impact?

 

    • Install anti-virus software from a reputable vendor (at your home, probably Windows Defender can be a great choice for a free version). Update it and use it regularly.
    • In addition to scanning for viruses on a regular basis, install an “on access” scanner (included in most anti-virus software packages) and configure it to start each time you start up your computer. This will protect your system by checking for viruses each time you run an executable file.
    • Use a virus scan before opening any new programs or files containing executable code. This includes packaged software that you buy from the store as well as any program you might download from the Internet.
    • If you are a member of an online community or chat room, be very careful about accepting files or clicking links that you find or that people send you within the community.
    • Make sure you back up your data (documents, bookmark files, important email messages, etc.) on disc so that you do not lose valuable work in the event of a virus infection.

Blog

From Our Blog

CK Cyber

To empower you with the knowledge for cybersecurity to protect the cyber-world.

What do we have?

Contact

CK Cyber all rights reserved © 2025