4. MALWARE AND ANTIVIRUS

4.2. How do we get malware infections?

There are two most common ways for malware to access the systems and cause an infection: Internet and Email. By itself, this means that every time we are connected, we are vulnerable. Nowadays, because we are always connected to Internet, if not at the desktop or laptop, at least on the smartphone or tablet, we are always vulnerable.

Malware can penetrate devices while surfing through hacked websites, view a legitimate site serving malicious ads, download infected files, install programs or apps from unaware sources, open a malicious email attachment, or almost everything else downloaded from the Internet on to a device that doesn’t have or has a wick anti-malware security application.

Malicious apps can hide in apparently legitimate applications, especially when they are downloaded from websites or direct links, instead of an official app store. Here it’s important to look at the warning messages when installing applications, especially if they seek permission to access your email or other personal information. Users tend to always press next until the end of the installation, not reading important information that is provided during the process. Many times, third-party software is included with the original app and gets installed in the device. The same way may happen to malware that can be hidden inside the original app file. It is important to install software obtained from trustful sources and developers.

Moreover, it’s best to stick also to trusted sources for mobile apps, only installing reputable third-party apps, and always downloading those apps directly from the vendor, and never from other websites. In addition, avoid downloading those special offers that promise a miracle Internet velocity, disk cleaner and more. Chose those apps from certificated and trustful sources.

As it is commonly said, the human being (user) is the main actor for any type of malware infection. That is, a trusting version of us, willing to open up an email attachment we don’t recognize, or to click and install something from an untrustworthy source. This is not only directed towards less experience user, but also skilled people have also fallen into this type of traps and end up infected with malware.

Even when installing something from a credible source, its important to pay attention to the permission request to install other bundled software at the same time, because it’s possible to install also undesired software, as mentioned before. This extra software, also known as a potentially unwanted program (PUP), is many times presented as a necessary component, but it often it is not.

There is, however, also the case of a blameless malware infection scenario. Because it’s, once again, possible to get an infection by just visiting a malicious website and viewing an infected page or banner ad that drives into a malware download. Malware distributed via bad ads on legitimate websites is known as malvertising.