Hi! I’m Gabriela — one of the Guardians of the Park of Codes and the one responsible for protecting computers, phones, and everything that connects to the internet.
Today, I’m going to show you how digital viruses and malware really work, how they get into your devices, what they can do once they’re inside, and how you can protect yourself the smart way.
What Is Malware?
Malware comes from malicious software.
It’s any type of program created to cause harm, steal information, spy on you, or take control of systems.
The worst part?
Most malware gets into your phone or computer without you even noticing.
Common Types of Malware
Virus
Spreads by infecting files and programs.
Example: You open a pirated file, and it installs something that damages your system.
Worm
Spreads automatically through networks, without user interaction.
Example: One computer at school gets infected, and soon others do too.
Trojan (Trojan Horse)
Looks harmless or useful, but hides something dangerous.
Example: A “free game” that secretly steals your data.
Spyware
Spies on your activity and steals passwords, messages, or banking data.
Example: Keyloggers that record everything you type.
Ransomware
Locks your device or files and demands payment to unlock them.
Example: A screen appears saying, “Your files have been encrypted. Pay to recover them.”
Adware
Fills your device with endless ads and pop-ups.
Example: One click opens dozens of fake promo tabs.
Rootkit
Hides malware deep inside the system so it’s hard to detect.
Example: You think your device is clean — but the attacker is still there.
How Does Malware Get In?
Malware usually enters through:
- Pirated games, apps, or software
- Fake emails with links or attachments
- Unsafe websites
- Fake browser extensions
- Infected USB drives
- Game mods and cheats
If something feels too good to be true, it probably is.
What Is an Endpoint?
An endpoint is any device that connects to a network or the internet:
- Computers and laptops
- Smartphones and tablets
- Game consoles
- Smart TVs
- Network printers
Every endpoint can be a door into your digital life.
How to Protect Yourself — Gabriela’s Guide
Use a Reliable Antivirus
Detects and removes known threats.
Many offer real-time protection.
Always keep it updated.
Understand EDR and XDR
EDR (Endpoint Detection and Response):
- Protects each device individually
- Detects suspicious behavior, not just known viruses
- Can isolate infected devices automatically
XDR (Extended Detection and Response):
- Goes beyond devices
- Connects alerts from email, network, servers, and cloud
- Provides a full security view
Think of it like this:
Antivirus = basic detective
EDR = elite investigator per device
XDR = a full cyber task force
What Does “Quarantine” Mean?
When security software finds a suspicious file, it doesn’t delete it immediately.
Instead, it isolates the file in a secure area where it can’t cause damage.
That’s quarantine.
Later, the system analyzes it to decide if it’s truly dangerous or a false alarm.
Gabriela’s Safety Rules
- Only download apps from official stores
- Don’t click suspicious links
- Be skeptical of “amazing” promotions
- Keep your antivirus and apps updated
- Use strong, unique passwords
- Avoid pirated sites, torrents, and unknown mods
- Never plug in random USB drives
- Enable two-factor authentication (MFA)
- If something feels off, ask for help
Thinking About a Cybersecurity Career?
You could specialize in:
- Malware Analysis
- Incident Response
- Endpoint Security (Antivirus, EDR, XDR)
- Reverse Engineering
- Threat Intelligence
- Cyber Defense
You can start learning early — and one day protect real systems, real people, and real data.
Knowledge is protection.
And protection starts with awareness.
— Gabriela, Cyber Heroes League



Deixe uma resposta