SlideShare a Scribd company logo
Are You A Host For Malware?
By
Venkateswara Reddy
Agenda
• About me
• What is a malware
• Types of malware
• What a malware Can do
• How malware propagates
• Demo Time
• You can eat my brain
About me
• Working as Security Consultant in TCS
• Also Bughunter
• Listed in Yahoo, Microsoft, Adobe, Cisco
etc….
• Offensive Security Certified Professional
WHAT IS A MALWARE?
• A malware is a piece of software which performs
malicious action
TYPES OF MALWARE
• Virus
• Worm
• Trojan
• Ransomware
• Adware
• Backdoor etc...
WHAT A MALWARE CAN DO?
• Steal Personal Information
• Delete files
• Use your computer resources
• Encrypt Data
HOW MALWARE PROPAGATES?
Are you a host to malware
Are you a host to malware
Human stupidity is proportional to getting
affected with malware
Few real time examples…!!!
This happened with my friend’s friend
on 11th Aug 2014…..
Are you a host to malware
Are you a host to malware
Are you a host to malware
Are you a host to malware
Thank you!!

More Related Content

PPTX
Malware & Anti-Malware
PPTX
MALWARE AND ITS TYPES
PPTX
PACE-IT, Security+3.1: Types of Malware
PDF
экологические основы природопользования гальперин м.в учебник_2003 -256с
PDF
05 fbs reader ch5
PDF
Soracom & myThingsを使ったハンズオンセミナーをやってみた
PDF
портфолио крупина
PPTX
Business Process Re-Engineering
Malware & Anti-Malware
MALWARE AND ITS TYPES
PACE-IT, Security+3.1: Types of Malware
экологические основы природопользования гальперин м.в учебник_2003 -256с
05 fbs reader ch5
Soracom & myThingsを使ったハンズオンセミナーをやってみた
портфолио крупина
Business Process Re-Engineering

Viewers also liked (14)

PDF
1221 w wagnermarket19141
ODT
Comp skillz
PPTX
Intel’s social media marketing strategy
PPT
Report 1612
PPT
мат. ответственноть
DOCX
How to see the badi
PDF
Barcelona syllabus 2015
PPTX
PDF
The spatial dimension of urban marginality
PPT
Drafts
DOCX
Documentos DE CONDUCION ECONOMICA
PPT
Kantoorinventaris
PPT
Ancientttt greeceeee
1221 w wagnermarket19141
Comp skillz
Intel’s social media marketing strategy
Report 1612
мат. ответственноть
How to see the badi
Barcelona syllabus 2015
The spatial dimension of urban marginality
Drafts
Documentos DE CONDUCION ECONOMICA
Kantoorinventaris
Ancientttt greeceeee
Ad

Similar to Are you a host to malware (20)

PPTX
MALWARES.pptx
PPTX
NS 2.pptx
PPT
list of Deception as well as detection techniques for maleware
PDF
What is a malware attack?
PPTX
What is Malware (Virus), Types of Malware
PPTX
What is Malware (Antivirus)
PPTX
Introduction To Malware
PPTX
PPTX
Module_09_Malware_Presentation_for_IT500.pptx
PPTX
Malware: To The Realm of Malicious Code (Training)
PPTX
Computer-vIRUS-malicious software and worm.pptx
PPTX
Major Computer Virus Types to Watch Out
ODP
Computer Viruses & Management Strategies
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PDF
Malware and malicious programs
PDF
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
PPTX
Malware Presentation with great explanination
PPTX
Virus and malware presentation
PPTX
(Training) Malware - To the Realm of Malicious Code
PPTX
lecture-11-30052022-103626am.pptx
MALWARES.pptx
NS 2.pptx
list of Deception as well as detection techniques for maleware
What is a malware attack?
What is Malware (Virus), Types of Malware
What is Malware (Antivirus)
Introduction To Malware
Module_09_Malware_Presentation_for_IT500.pptx
Malware: To The Realm of Malicious Code (Training)
Computer-vIRUS-malicious software and worm.pptx
Major Computer Virus Types to Watch Out
Computer Viruses & Management Strategies
Malware and Anti-Malware Seminar by Benny Czarny
Malware and malicious programs
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Malware Presentation with great explanination
Virus and malware presentation
(Training) Malware - To the Realm of Malicious Code
lecture-11-30052022-103626am.pptx
Ad

Recently uploaded (20)

PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PPTX
Custom Software Development Services.pptx.pptx
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PPTX
chapter 5 systemdesign2008.pptx for cimputer science students
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
Cost to Outsource Software Development in 2025
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
"Secure File Sharing Solutions on AWS".pptx
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Types of Token_ From Utility to Security.pdf
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Custom Software Development Services.pptx.pptx
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
chapter 5 systemdesign2008.pptx for cimputer science students
DNT Brochure 2025 – ISV Solutions @ D365
Cost to Outsource Software Development in 2025
Salesforce Agentforce AI Implementation.pdf
Designing Intelligence for the Shop Floor.pdf
"Secure File Sharing Solutions on AWS".pptx
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Advanced SystemCare Ultimate Crack + Portable (2025)
Types of Token_ From Utility to Security.pdf
MCP Security Tutorial - Beginner to Advanced
Wondershare Recoverit Full Crack New Version (Latest 2025)
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
How to Use SharePoint as an ISO-Compliant Document Management System
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Topaz Photo AI Crack New Download (Latest 2025)
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025

Are you a host to malware