Malware (short for “malicious software”) is a software specifically created with the intention to harm and infect a specific network or system that it will be targeting. It is important to note that while this may sound like a virus, a virus is just one type of malware that can be a large threat to your computer’s safety. It’s evolution began with hackers writing down simple viruses that would infect computer systems to now days advanced financial malware such as ransomware threatening to infect both personal and corporate systems.

Below is a list of the most common types of malware in order to help you understand specifically in what forms it may come in as well as how to differentiate potential threats that could be prevented before they do any damage:

  • Virus
    • A virus is a specific type of code that infects various other software within the host system that is ebing attacked. Think of it as more a parasite that spreads through script files and documents. Viruses can be known to compromise personal information, steal money and harm networks.
  • Adware
    • This is short for advertising supported software which is an aspect of malware that automatically delivers advertisements. Traditional examples of adware include; pop ups, get rich quick schemes or “free” versions of software that are “exclusively” available to only you. Adware if successful in entering your network, has the ability to track all user activity as well as steal valuable personal information.
  • Spyware
    • This is a type of malware that has the ability to spy on user’s activity without their knowledge. This can come in the form of collecting account, login or financial data as well as modifying security settings to intefere with networks.
  • Worms
    • Worms are perhaps the most common type of malware in the aspect that they consume excessive amounts of bandwidth and thus overload web servers which as a result will disrupt the system. Once the damage has been done to a hsot computer, a worm will have the ability to steal valuable data, delete files or continue tracking user activity. The most common way in which worms are spread is through mass emails with infected attachments to all contacts of the compromised computer and profile.
  • Trojan
    • A trojan is dangerous as it’s aim is to disguise itself as a normal file or program with the intention to trick users into downloading and installing it. Once this program has been downloaded and granted access into the system, the attacker will be given the autonomy to steal data, install further malware or even monitor all user activity. We cannot stress enough how vital it is to never download anything that looks even somewhat suspicious as downloading it yourself will bypass all security if you deem a program to be “safe” by your standards.
  • Spam
    • While this type of food may not be popular among a wider population, the type of malware carries an even larger stigma. Spam is simply the electronic sending of unsolicited messages. Of course the cliche yet most common way to spam is through e-mail. Spam however can reach potential targets through blogs (don’t worry this one is safe), social media, texting and instant messages. Once a system is infected, this will create a chain like type of events in which it will target contacts within every distribution channel possible.

It is vital to set yourself up to counter any malicious software that threatens to compromise any valuable data within your computer or overall network. We have only briefly touched on each of these types of malware, thus, you should continue to research each of these aspects in more detail to ensure you’re adequately prepared.


Excite IT, Brace168, and VITCS Merge to Form Excite Cyber: A New Era of Fearless Technology Solutions

X