Viruses are essentially a form of malware. The term computer virus has been around since the early 1970s. Malware, which is short for malicious software has been around since the mid-1980s but began picking up steam around 2003. The various types of malware continue to grow over time, which increases the need for proper security hardware and software to help protect your laptops, desktops, tablets and smart phones form these infections.
To help provide clarity around the different types of malware, below is a list with short descriptions for you. If you have additional questions beyond the detail below, please don't hesitate to let a technology advisor at STS know. They will be happy to assist with all your questions and concerns.
1. Adware - short for advertising-supported software that automatically delivers advertisements. The primary purpose for adware is to deliver advertisements, however it's been known to track user activity and steal personal information.
2. Bot - Bots automatically perform specific operations and can appear in the form of Botnets, which include a number of internet connected devices running one or more Bots. They can disguise themselves as popular search items on download sites. They exist for sending spam, stealing data and relinquishing control of a device to its attacker for other malicious purposes.
3. Bug - A software flaw that can result in an undesired outcome. Bugs that are minor in nature can go unnoticed for a long time and remain undiscovered. Major bugs can cause a device to crash, freeze or allow the attacker unauthorized access to steal your data.
4. Ransomware - Holds a computer system captive while the hacker waits for their ransom. Ransomware restricts access to the computer data by either encrypting the files or completely locking the system down, not allowing the owner access.
5. Rootkit - Designed to remotely access a computer without being detected. Rootkits can remotely execute files, steal information, modify device configurations or control the computer for use in a botnet attack. Prevention methods for guarding against rootkits include patching software, application and operating system vulnerabilities. Avoiding suspicious downloads via email and internet links, updating virus definitions and performing regular scans also help in the prevention of rootkits.
6. Spyware - Created for spying on a computer user without their knowledge. Spyware can collect keystrokes as well as gather personal account information, financial data and web site log-ins. This form of malware spreads itself by bundling with other software and exploiting software bugs/vulnerabilities.
7. Trojan Horse - Disguise’s itself as a normal file or program, attempting to trick users into downloading and installing it. This form of malware possesses traits similar to other malware type where it attempts to steal financial data and logins, install more malware, modify files, monitor screen activity, key logging and use the computer in botnets.
8. Virus - capable of duplicating and spreading itself, like a viral illness for a human. Viruses attach themselves to software programs and begin creating damage once the program is executed. They can steal a user’s personal information, harm computers or networks, steal money, push advertisements and more.
9. Worm - The most common form of malware that exploits operating system vulnerabilities for spreading itself across devices on a computer network. A symptom of a worm infection includes slow internet connectivity due to reduced network bandwidth or mass emails sent from your computer to names in your contact list. Worm infections are designed to steal data, create botnets and delete files. They possess similar characteristics to a virus however viruses need humans to spread them by executing programs. Worms need no human intervention.