What is Malware?

Malware is a generic term for malicious software designed to damage or negatively impact a user, their experience, computer, connection, data or finances.

Glossary of Malware

How does the software Virus spread?

A computer virus spreads itself by piggybacking and hiding its code inside another program or application, much like a biological viral infection. Not only does a computer virus spread rapidly and make the host software and computer unusable, but also exhibits malicious behaviour.


Rogue/Scareware – Your system is at risk, download now the most secure antivirus ever created! – What this is not a good idea?


Also known as “Rogue Anti-Spyware” or “Rogue Anti-Virus”, rogues pretend to be security software. They frequently use fake warnings to force users into purchasing the software or application, which the criminals profit from laundering money. These can be similar to “Trojans”.


Ransomware – If you want your files, pay me Bitcoin. – Where did I got such emails?


Ransomware encrypts the user’s data or locks down the entire device. You are asked to pay a “ransom” via cryptocurrency, or an anonymous service to unlock your computer or your files. Typically, the only way to recover the data is from a backup, as paying the ransom will not necessarily deliver the unlock code.


Spyware – Every website I visit prompts me with adverts which are matching my interests. How does internet knows what I like?


Spyware is software that spies on you by collecting various types of data from your device without your knowledge. Data is used to create targeted adverts based on your online search or purchase history. 


Adware – I clicked a link with a headphones discount and now I got countless adverts. – Why did that happen?


Adware is a combination of the word “advert” and “software”. This type of malware forces adverts in front of the user. The adware itself may not be dangerous, but the display of countless adverts is annoying and disruptive and is detected by good anti-malware solutions.


Trojan – The uninvited guest. – How does it work? 


A Trojan is a type of malware that is disguised as, or inside, a useful application. A Trojan aims to have the user open the program, allowing it to either take control of your computer and use it for its purpose or function in the background without user awareness. This typically results in the installation of additional malware (such as backdoors or keyloggers) to your system.


Worm – Something is crawling around my system. – Why is my computer infected?


Worms are malicious applications that aim to spread as fast as possible once your computer has been infected. Unlike viruses, they don’t require a host program but instead spread themselves through USB devices, e-mails or vulnerabilities in your computer’s operating system or other applications. Their spread causes a slowdown, affecting the performance of computers and networks, and they may also have direct malicious behaviour.


Keyloggers – How has someone guessed my password?


Keyloggers secretly record everything you type on your keyboard, which allows attackers to get their hands on your passwords or other important data such as online banking details.


Exploit – What is it? Why is it dangerous?


Exploits are vulnerabilities in a computer program. Using them, an attacker can gain either partial or full control of your device. More recently exploits have been found in device firmware and some processors.


Rootkit – Where did it come from?


A rootkit usually consists of several components that grant the author unauthorised access to the target system. These programs hide their processes and actions using other software and are typically installed through an exploit or a Trojan.


Backdoor – I got an anti-malware software and firewall installed, however I got breached anyway. – How did that happen?


A backdoor is a portion of code that is usually implemented into a program by the software’s author, to enable access to your computer or an otherwise protected software function. Backdoors are often installed by Trojans once they have been executed, so that the attacker can gain direct access to your device. The infected computer, also known as a “bot”, then becomes part of a botnet.

Ready to make your IT work for you?

It all starts with a conversation…