{"id":3894,"date":"2025-03-21T14:26:04","date_gmt":"2025-03-21T13:26:04","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=3894"},"modified":"2025-12-17T09:46:31","modified_gmt":"2025-12-17T08:46:31","slug":"typy-malveru","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/typy-malveru\/","title":{"rendered":"Types of malware"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3894\" class=\"elementor elementor-3894\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d96ee1 elementor-widget elementor-widget-heading\" data-id=\"0d96ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Types and targets of malware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95032b4 e-con-full e-flex e-con e-child\" data-id=\"95032b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62ac2fc elementor-widget elementor-widget-button\" data-id=\"62ac2fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/vzdelavanie\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7acf52 elementor-widget elementor-widget-button\" data-id=\"f7acf52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/malver\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Previous topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0095b1 elementor-widget elementor-widget-button\" data-id=\"b0095b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/malver-sposoby-sirenia-a-ochrana-pred-malverom\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21aa2d0 e-flex e-con-boxed e-con e-child\" data-id=\"21aa2d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d501a9 e-flex e-con-boxed e-con e-parent\" data-id=\"4d501a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad6e7d0 e-con-full e-flex e-con e-child\" data-id=\"ad6e7d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81bcaf2 elementor-widget elementor-widget-text-editor\" data-id=\"81bcaf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"SK\">Malware is a broad term that includes various <\/span><span lang=\"SK\">types (forms). <\/span><span lang=\"SK\">We can distinguish individual types based on their attributes or properties. This is an approximate classification that is constantly changing and being supplemented. <\/span><span lang=\"SK\">Based on an estimate of the type of malware, the user will be able to determine steps to prevent its consequences, or determine the damage.<\/span><\/p><p class=\"paragraph\" style=\"text-align: justify; text-justify: inter-ideograph; line-height: 115%; vertical-align: baseline; margin: 6.0pt 0cm 0cm 0cm;\"><span lang=\"SK\">Malware is most often confused with the term virus, which is just one type of malware.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22bde52 e-flex e-con-boxed e-con e-parent\" data-id=\"22bde52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22f6f26 elementor-widget elementor-widget-heading\" data-id=\"22f6f26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Types of malware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dbb1413 e-flex e-con-boxed e-con e-parent\" data-id=\"dbb1413\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-704d5ca e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"704d5ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"117757386\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\" data-no-translation-aria-label=\"\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1177573861\" data-tab-title-id=\"e-n-tab-title-1177573861\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1177573861\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComputer virus\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573862\" data-tab-title-id=\"e-n-tab-title-1177573862\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573862\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComputer worm\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573863\" data-tab-title-id=\"e-n-tab-title-1177573863\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573863\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tRansomware\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573864\" data-tab-title-id=\"e-n-tab-title-1177573864\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573864\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tTrojan house\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573865\" data-tab-title-id=\"e-n-tab-title-1177573865\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573865\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAdware\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573866\" data-tab-title-id=\"e-n-tab-title-1177573866\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573866\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSpyware\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573867\" data-tab-title-id=\"e-n-tab-title-1177573867\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573867\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBot\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573868\" data-tab-title-id=\"e-n-tab-title-1177573868\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573868\" style=\"--n-tabs-title-order: 8;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tRootkit\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177573869\" data-tab-title-id=\"e-n-tab-title-1177573869\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177573869\" style=\"--n-tabs-title-order: 9;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tKeylogger\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-11775738610\" data-tab-title-id=\"e-n-tab-title-11775738610\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-11775738610\" style=\"--n-tabs-title-order: 10;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBackdoor\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1177573861\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573861\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-f2a5612 e-con-full e-flex e-con e-child\" data-id=\"f2a5612\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c0fcb94 e-con-full e-flex e-con e-child\" data-id=\"c0fcb94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33608ed elementor-widget elementor-widget-text-editor\" data-id=\"33608ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"SK\">Viruses often spread to other computers by attaching themselves to various programs and executing code when a user runs one of these infected programs.<\/span><\/p><p><span lang=\"SK\">A virus spreads from system to system by attaching its code to other files. Once the file is accessed, the virus activates and performs whatever attack or action the attacker wants.<\/span><\/p><p><span lang=\"SK\">Viruses can also spread through scripts, documents, and vulnerabilities in web applications.<br \/><\/span><\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fcad85b e-con-full e-flex e-con e-child\" data-id=\"fcad85b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9625411 elementor-widget elementor-widget-image\" data-id=\"9625411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/Screenshot-2025-08-05-142227-r9t6lhvjf35satcb4o12o82jx91skq9lv09ghaj280.png\" title=\"Screenshot 2025-08-05 142227\" alt=\"Screenshot 2025-08-05 142227\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573862\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573862\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-162ee12 e-con-full e-flex e-con e-child\" data-id=\"162ee12\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-719973c e-con-full e-flex e-con e-child\" data-id=\"719973c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54ee68f elementor-widget elementor-widget-text-editor\" data-id=\"54ee68f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>They spread across computer networks by exploiting vulnerabilities in operating systems.<\/p><p>Worms typically cause damage to computer networks by overloading those networks or overloading web servers.<\/p><p>Computer worms differ from viruses in that they have the ability to replicate and spread independently, while viruses rely on human activity to spread.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58012a9 e-con-full e-flex e-con e-child\" data-id=\"58012a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5069e98 elementor-widget elementor-widget-image\" data-id=\"5069e98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Worm_image.webp\" title=\"cervsk\" alt=\"cervsk\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/cyber-sectech.fandom.com\/wiki\/Worm<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573863\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573863\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-3463db4 e-con-full e-flex e-con e-child\" data-id=\"3463db4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f4ad108 e-con-full e-flex e-con e-child\" data-id=\"f4ad108\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e86b9b elementor-widget elementor-widget-text-editor\" data-id=\"1e86b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This malware restricts a user's access to the computer by either <span style=\"color: #0c3a76;\"><strong>encrypting files on the hard drive or locking the system<\/strong><\/span> and displaying ransom messages.<\/p><p>This is how attackers try to force the user to <strong><span style=\"color: #0c3a76;\">pay a ransom<\/span><\/strong>, which is often in Bitcoin or another digital currency. Once paid, the restrictions are removed, and the user is given full access to their device or data.<\/p><p>In practice, it often happens that <span style=\"color: #0c3a76;\"><strong>after paying<\/strong><\/span> a certain amount of money, <strong><span style=\"color: #0c3a76;\">attackers demand a higher amount<\/span><\/strong> of money, or <strong><span style=\"color: #0c3a76;\">the program to decrypt files does not work<\/span><\/strong> or <strong><span style=\"color: #0c3a76;\">is not provided<\/span><\/strong>.<br \/><br \/>Ransomware usually spreads itself as a computer worm that gets onto a device through a downloaded file or other vulnerability in the operating system or application.<\/p><p>After a ransomware attack, <strong><span style=\"color: #0c3a76;\">data often cannot be restored (decrypted)<\/span><\/strong>, so we recommend backing up your data to external or cloud storage.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da21d9e e-con-full e-flex e-con e-child\" data-id=\"da21d9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b148a3e elementor-widget elementor-widget-image\" data-id=\"b148a3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-768x768.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4014\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-768x768.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-300x300.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-1024x1024.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-150x150.jpg 150w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-1536x1536.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-12x12.jpg 12w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831-600x600.jpg 600w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/7054831.jpg 2000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573864\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573864\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\"elementor-element elementor-element-72e5cd7 e-flex e-con-boxed e-con e-child\" data-id=\"72e5cd7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8ac72f0 e-con-full e-flex e-con e-child\" data-id=\"8ac72f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5fec01 elementor-widget elementor-widget-text-editor\" data-id=\"c5fec01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Named after the horse used by the Greeks as a ruse in the Trojan War, a Trojan horse disguises itself as a regular program but allows others to remotely access an infected computer.<\/p><p>Once an attacker has access to an infected computer, it is possible for the attacker to steal data (login details, personal information, even electronic money), install more malicious programs, modify files, or monitor user activity.<\/p><p>Trojans usually appear as audio or video plug-ins, required to play a music or video file, watch online videos, web browser plug-ins, games, or something fun or useful.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be459f4 e-con-full e-flex e-con e-child\" data-id=\"be459f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8a58e6 elementor-widget elementor-widget-image\" data-id=\"d8a58e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/elementor\/thumbs\/trojan-horse-r0ypo9772yzr3r7nq82qoj1z5wdisj12rc2b4y5fk0.png\" title=\"trojan-horse\" alt=\"trojan-horse\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Nikita Golubev \/ Flaticon<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573865\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573865\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\"elementor-element elementor-element-816a7d5 e-flex e-con-boxed e-con e-child\" data-id=\"816a7d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c9e5a2b e-con-full e-flex e-con e-child\" data-id=\"c9e5a2b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f86cd9 elementor-widget elementor-widget-text-editor\" data-id=\"2f86cd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is a type of malware that automatically displays advertisements, such as pop-up ads on websites or in applications, and can be included in free applications bundled with ads to generate revenue.<\/p><p>Adware can also be associated with spyware, which tracks user activity and collects information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f83c7b9 e-con-full e-flex e-con e-child\" data-id=\"f83c7b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe06b5 elementor-widget elementor-widget-image\" data-id=\"cfe06b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-768x768.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4015\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-768x768.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-300x300.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-1024x1024.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-150x150.jpg 150w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-1536x1536.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-12x12.jpg 12w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831-600x600.jpg 600w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/373222-PBDUVP-831.jpg 2000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573866\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573866\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\"elementor-element elementor-element-f0cee0c e-flex e-con-boxed e-con e-child\" data-id=\"f0cee0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-df2a460 e-con-full e-flex e-con e-child\" data-id=\"df2a460\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e460d5 elementor-widget elementor-widget-text-editor\" data-id=\"4e460d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is a type of malware that silently tracks and collects user activity, including keystrokes and sensitive data, and often changes the security settings of browsers and applications.<\/p><p>Its spread often exploits program vulnerabilities in conjunction with Trojan horses or even legitimate programs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec042fb e-con-full e-flex e-con e-child\" data-id=\"ec042fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01c8acf elementor-widget elementor-widget-image\" data-id=\"01c8acf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945480-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4019\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945480-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945480-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945480-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945480-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945480-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945480-18x12.jpg 18w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: vectorjuice \/ Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573867\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573867\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\"elementor-element elementor-element-8a7f423 e-flex e-con-boxed e-con e-child\" data-id=\"8a7f423\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-34c32d5 e-con-full e-flex e-con e-child\" data-id=\"34c32d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-402b4e8 elementor-widget elementor-widget-text-editor\" data-id=\"402b4e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is a type of malware that automates various specific operations.<\/p><p>The attacker takes control of the device using malware. The attacker tries to keep the user unaware that the bot is on their device.<\/p><p>Although some are intended for benign purposes such as video games, online auctions or competitions, malicious use, for example in botnets (a group of computers controlled by third parties) used for DDoS (overloading applications, websites or services, leading to their inoperability) attacks or spamming (sending unsolicited email) is more and more common.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50c5eeb e-con-full e-flex e-con e-child\" data-id=\"50c5eeb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cbcf9b elementor-widget elementor-widget-image\" data-id=\"4cbcf9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945658-768x768.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4025\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945658-768x768.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945658-300x300.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945658-1024x1024.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20945658-12x12.jpg 12w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: vectorjuice \/ Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573868\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573868\" data-tab-index=\"8\" style=\"--n-tabs-title-order: 8;\" class=\"elementor-element elementor-element-8e8bfd5 e-flex e-con-boxed e-con e-child\" data-id=\"8e8bfd5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63db226 e-con-full e-flex e-con e-child\" data-id=\"63db226\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41df894 elementor-widget elementor-widget-text-editor\" data-id=\"41df894\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is designed to remotely access or control a computer without being detected by users.<\/p><p>It constantly hides its presence, so typical security products are not effective in detecting and removing rootkits.<\/p><p>Rootkits allow attackers <span style=\"color: #0c3a76;\"><strong>to hide<\/strong><\/span> malicious processes, files, and the like, ensuring long-term control over the infected system.<\/p><p>They are detected by special rootkit scans.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75cccb9 e-con-full e-flex e-con e-child\" data-id=\"75cccb9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df325d0 elementor-widget elementor-widget-image\" data-id=\"df325d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/elementor\/thumbs\/rootkit-r0yozbjbs6ux45fkby211bkrux9zll1ezx1ltp4em8.png\" title=\"rootkit\" alt=\"rootkit\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source:  Awicon \/ Flaticon.com<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177573869\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177573869\" data-tab-index=\"9\" style=\"--n-tabs-title-order: 9;\" class=\"elementor-element elementor-element-5a787fa e-flex e-con-boxed e-con e-child\" data-id=\"5a787fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7ec00c e-con-full e-flex e-con e-child\" data-id=\"d7ec00c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c41cfc elementor-widget elementor-widget-text-editor\" data-id=\"9c41cfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is a special type of malware that can <strong><span style=\"color: #0c3a76;\">silently monitor and record all keystrokes<\/span><\/strong> and activities performed on a user's device.<\/p><p><span style=\"color: #000000;\">It captures data such as:<\/span><\/p><ul><li>login names<\/li><li>passwords<\/li><li>credit card numbers and bank details<\/li><li>private message content<\/li><li>other sensitive data.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-88d6871 e-con-full e-flex e-con e-child\" data-id=\"88d6871\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a90bc0 elementor-widget elementor-widget-image\" data-id=\"1a90bc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20944445.jpg\" class=\"attachment-ocean-thumb-m size-ocean-thumb-m wp-image-4027\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20944445.jpg 7730w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20944445-300x300.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20944445-1024x1024.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20944445-768x768.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/20944445-12x12.jpg 12w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: vectorjuice \/ Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-11775738610\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-11775738610\" data-tab-index=\"10\" style=\"--n-tabs-title-order: 10;\" class=\"elementor-element elementor-element-9fc31bf e-flex e-con-boxed e-con e-child\" data-id=\"9fc31bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8214a4a e-con-full e-flex e-con e-child\" data-id=\"8214a4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a09faf elementor-widget elementor-widget-text-editor\" data-id=\"6a09faf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It allows remote access to an infected computer and control of that computer without the user's knowledge.<\/p><p>A backdoor bypasses common security mechanisms such as passwords or firewalls, allowing attackers to perform various malicious activities, such as:<\/p><ol><li><span style=\"color: #0c3a76;\"><strong>Installing additional malware<\/strong><\/span> (ransomware, keyloggers, spyware)<\/li><li><span style=\"color: #0c3a76;\"><strong>Obtaining sensitive data<\/strong> <\/span>(passwords, files, financial information)<\/li><li><span style=\"color: #0c3a76;\"><strong>Using the computer for other attacks<\/strong><\/span> (e.g. DDoS attacks)<\/li><li><span style=\"color: #0c3a76;\"><strong>Creating botnets<\/strong><\/span> \u2013 a network of infected devices controlled by an attacker<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f13bd7c e-con-full e-flex e-con e-child\" data-id=\"f13bd7c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c89c27 elementor-widget elementor-widget-image\" data-id=\"3c89c27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"631\" height=\"487\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/backdoor11.png\" class=\"attachment-large size-large wp-image-6907\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/backdoor11.png 631w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/backdoor11-300x232.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/backdoor11-16x12.png 16w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/www.geeksforgeeks.org\/ethical-hacking\/how-to-prevent-backdoor-attacks\/<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0f350c e-flex e-con-boxed e-con e-parent\" data-id=\"b0f350c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2947db9 elementor-widget elementor-widget-image\" data-id=\"2947db9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"652\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Malware_Glossary_3.jpg\" class=\"attachment-large size-large wp-image-6911\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Malware_Glossary_3.jpg 1400w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Malware_Glossary_3-300x191.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Malware_Glossary_3-1024x652.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Malware_Glossary_3-768x489.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Malware_Glossary_3-18x12.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/sosafe-awareness.com\/sosafe-files\/uploads\/2023\/05\/Malware_Glossary_3.jpg<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89ad43a e-flex e-con-boxed e-con e-parent\" data-id=\"89ad43a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e92d50 elementor-widget elementor-widget-spacer\" data-id=\"2e92d50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e43953 e-flex e-con-boxed e-con e-parent\" data-id=\"3e43953\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-066116c elementor-widget elementor-widget-heading\" data-id=\"066116c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Malware targets<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aab12ec elementor-widget elementor-widget-text-editor\" data-id=\"aab12ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An important characteristic of malware is the goal the attacker is after. A quick overview of the goals of malware authors gives a good idea of \u200b\u200bwhy the malware threat is so serious:<\/p><ol><li><span style=\"color: #0c3a76;\"><strong>Credit card or other banking information<\/strong><\/span>: Credit card information and related personal information are a tempting and common target. Once this information is obtained, an attacker can purchase any type of product or service (e.g., web services, games, merchandise, or other products).<\/li><li><span style=\"color: #0c3a76;\"><strong>Passwords:<\/strong><\/span> They are a very attractive target for attackers. Compromise of this type of information can be devastating for victims. Most users use the same passwords for several or all systems, including sensitive ones (e.g. internet banking, email account).<\/li><li><span style=\"color: #0c3a76;\"><strong>Confidential or insider information<\/strong><\/span>: An attacker can use malware to effectively obtain such information from an organization to gain competitive or financial advantage.<\/li><li><span style=\"color: #0c3a76;\"><strong>Storing malicious or illegal content<\/strong><\/span>: In some cases, a system infected with malware can be used to store data without the owners' knowledge. Uploading data to an infected system can turn that system into a server that shares any type of content (e.g., movies, pirated software, pornography, malware, financial data, or even child pornography).<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef3746d e-flex e-con-boxed e-con e-parent\" data-id=\"ef3746d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4171778 elementor-widget elementor-widget-spacer\" data-id=\"4171778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Malv\u00e9r Typy a ciele malv\u00e9ru Sp\u00e4\u0165 Predo\u0161l\u00e1 t\u00e9ma \u010eal\u0161ia t\u00e9ma Malv\u00e9r predstavuje \u0161irok\u00fd pojem, ktor\u00fd v\u202fsebe zah\u0155\u0148a r\u00f4zne typy (formy). Jednotliv\u00e9 typy m\u00f4\u017eeme od seba rozli\u0161ova\u0165 na z\u00e1klade ich atrib\u00fatov alebo vlastnost\u00ed. Ide o\u202fpribli\u017en\u00fa klasifik\u00e1ciu, ktor\u00e1 sa neust\u00e1le men\u00ed a\u202fdop\u013a\u0148a. Pou\u017e\u00edvate\u013e na z\u00e1klade odhadu typu malv\u00e9ru, bude vedie\u0165 ur\u010di\u0165 kroky k\u202fzamedzeniu jeho d\u00f4sledkov, resp. ur\u010deniu [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-3894","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=3894"}],"version-history":[{"count":79,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3894\/revisions"}],"predecessor-version":[{"id":6985,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3894\/revisions\/6985"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=3894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}