Type
|
Description
|
---|---|
Gathers data, such as account user names and passwords, and transmits
them to third parties.
|
|
Displays advertisements and gathers data, such as user web surfing
preferences, used for targeting advertisements at the user through a
web browser.
|
|
Changes endpoint Internet settings and can force the
endpoint to dial pre-configured phone numbers through a modem. These
are often pay-per-call or international numbers that can result in a
significant expense for your organization.
|
|
Causes abnormal endpoint behavior, such as closing and
opening the CD-ROM tray and displaying numerous message boxes.
|
|
Helps hackers enter endpoints.
|
|
Helps hackers remotely access and control endpoints.
|
|
Helps hackers decipher account user names and passwords.
|
|
Others
|
Other types of potentially malicious programs.
|