Edited public domain image via Pixabay This article gives a definition of malware, examines six examples, and outlines three approaches that can be used to minimize or prevent being affected by malware.

Definition of Malware

Malware is malicious software that has been designed with the intention of idisrupting, corrupting, or otherwise damaging a computer system, typically through gaining unauthorized access.

6 Examples of Malware

Here are 6 malware examples: I will explain each example in more detail below.

1. Virus

In computer terms, a virus is a malicious piece of code, or a program which is capable copying itself and spreading from one computer system or device to another. Viruses are usually written with the intention of having a disruptive effect on the machines that they infect, causing such issues as the destruction of data, or the corruption of the operating system. Viruses typically work by inserting or attaching themselves to legitimate pieces of software in order to facilitate the execution of their code. The best way to protect a device from a virus is by installing anti-virus software and keeping it up-to-date.

2. Trojan

A Trojan (or Trojan horse) is a form of malware that hides its real content to trick the computer user into believing that it’s a legitimate file. One common way that this deception happens is when a trojan arrives attached to an email from a trusted source. Unlike, viruses, which can activate and replicate themselves, trojans rely on the user to activate them. Computer Trojans are named after the wooden horse that was used to sack the ancient city of Troy. The wooden horse was built and left outside the city by Greek soldiers who were besieging Troy. The horse was thought by the people of Troy (known as Trojans) to be a harmless victory trophy, so they brought it inside the city walls - but inside it were Greek soldiers who emerged at night and opened the city gates, enabling the invasion and fall of the city.

3. Spyware

This type of malware infiltrates the computer system, accessing and monitoring the user’s activities, such as internet usage data and sensitive information. It then relays this personal information to advertisers, data firms, or others. Spyware is a threat to both businesses and individual users and is used for many purposes, such as to track and sell internet usage data, steal credit card or bank account details, or for identity theft. It does this through actions such as tracking the user’s login and password information, and spying on sensitive information.

4. Worm

Worms typically use computer networks to spread themselves. They exploit weaknesses in security software, or can arrive via spam emails or instant messages. Once established, the worm can then use the host computer to scan and infect others. Worms can corrupt and delete files, or create additional malware programs on the user’s computer. All this can happen without the user knowing anything until the worm is established. Some worms do nothing but replicate themselves repeatedly, overloading the computer and network. Others will steal information, or open a back door for hackers to use.

5. Adware

As its name implies, this type of malware inundates the user with unwanted advertising. Adware programs can change the browser’s homepage, bombard the screen with pop-up ads, as well as create spyware. Although this software may not sound as bad as other forms of malware, it can be extremely irritating and disruptive, and is often capable of causing your device long-term problems. It is common for this malware to slow down or even crash your device. It can also use up your internet bandwidth. Adware is the name for this software when it infects a computer, but is known as madware when it’s on a mobile device, such as a smartphone.

6. Ransomware

Ransomware is a particularly sinister form of malware that is used to extort money from users by criminals. It uses encryption to hold a user’s data with the promise that the data will be restored upon payment of a ransom. Ransomware gets onto a computer by either fooling the user into installing it, or by making use of weaknesses in the device’s security software. This type of malware can target not just individual users, but also high profile institutions such as hospitals, universities, and government agencies.

How to Avoid Malware Infections

Generally speaking, there are three approaches that you should take to minimize or prevent malware infections: This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional. © 2020 Paul Goodman

Comments

Umesh Chandra Bhatt from Kharghar, Navi Mumbai, India on December 22, 2020: Well explained. Thanks.

What Is Malware  Definition and 6 Examples - 3