What is Malware in Computers? Different Types Of Malware.

In this article, I will explain all terms of Computer Viruses like What is Malware? The Types of Malware, and How this malware can infect our system/PC. Let’s discuss these terms –

What is Malware in computers?

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware.

Programs are also considered malware if they secretly act against the interests of the computer user. For example, at one point Sony music Compact discs silently installed a rootkit on purchasers’ computers with the intention of preventing illicit copying, but which also reported on users’ listening habits, and unintentionally created extra security vulnerabilities……………………..says Wikipedia


  • Trojan Horse
    A Trojan Horse is a type of malware that pretends to be something useful, helpful, or fun while actually causing harm or stealing data. Trojans are often silently downloading other malware (e.g. spyware, adware, ransomware) on an infected device as well.
trojan-horse image
Trojan-horse image
  • Worm
    A computer worm is a type of Trojan that is capable of propagating or replicating itself from one system to another. It can do this in a number of ways. Unlike viruses, worms don’t need a host file to latch onto. After arriving and executing on a target system, it can do a number of malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting files, and consuming bandwidth.
WORM virus
WORM virus
  • Spyware
    Spyware is a type of malware that’s hard to detect. It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the Internet to pass this information along to third parties without you knowing. Keyloggers are a type of spyware that monitors your keystrokes.
  • Ransomware
    Ransom malware or ransomware is a threat that prevents users from accessing their system or personal files and demands a ransom payment in order to regain access.
  • Rootkits
    The term “rootkit” comes from “rootkit,” a package giving the highest privileges in the system. It is used to describe software that allows for the stealthy presence of unauthorized functionality in the system. As rootkit continually hides its presence, it is hard to prevent, detect, and remove it.
  • Keyloggers

A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate uses; businesses can use them to monitor employee activity and families may use them to keep track of children’s online behaviors.

  • Botnets

Botnets are popular with hacker show-offs (the more bots you collect, the mightier a hacker you are) and cyber criminals spreading ransomware. Botnets can include millions of devices as they spread undetected.

  • Phishing

Phishing is a type of social engineering attack, rather than a type of malware. But is a common method of a cyber attack. Phishing is successful since the emails sent, text messages, and web links created to look like they’re from trusted sources. They’re sent by criminals to fraudulently acquire personal and financial information.

  • Scareware

Scareware is a malware tactic that manipulates users into believing they need to download or buy malicious, sometimes useless, software. Most often initiated using a pop-up ad, scareware uses social engineering to take advantage of a user’s fear, coaxing them into installing fake anti-virus software. Scareware goals can vary from selling useless, fake tools to the installation of damaging malware that exposes sensitive data.

This is all about Malwares and Types of malware. So if you like the post, please share it with your friends. Guys if you have doubts or any queries with this post then don’t hesitate to contact me. And if you have any suggestions for me then please write to me in the comment box.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s