Chapter 5. Malware Threats

This chapter covers the following topics:

Image Viruses and worms: This category of malware continues to be a real threat and can be used to launch many different types of attacks.

Image Trojans: Trojans are one of the top malware threats today and can be used for anything from spying on a user to controlling the user’s system.

Image Covert communication: Any means of sending information in some way that is not usually allowed is considered ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.