≡ Menu

Types of Malware that can infect your computer

Types of malware
It's only fair to share...Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone

Has your browser forgotten your homepage? Do you have problem with browser not connecting to internet? Is your computer which used to be fast is crawling now? Do you get frequent pop-ups on the screen?

All these problems are because there is malware or malicious software inside your computer. Malware is a general term used for all computer infections that is designed to create problems and steal information from your computer.

Understanding these different types of malware can help you decide on the course of action needed to fix the problem.

Types of malware

    1. Virus – Virus is a malware program that can spreads to other programs when you run it. The malware program is usually in the form an executing file. Most virus files are harmless until you click and execute the program. Once executed it infect files, mainly system files which is responsible for creating problem.
    1. Spyware – This malware is used for the purpose of spying on your computer. The purpose of spying varies from genuine cases such as understanding browser habits, location, trends etc. to malicious purpose such as gather credit card details, social security number etc.
    1. Worm – Worms are similar to Virus except that it doesn’t need a user to do anything to start infecting. It is designed to replicate itself. Once inside the network, it replicates and try to infect other devices inside the network.
    1. Adware – Adware malwares are annoying by displaying pop-ups, ads and change browser links. But this is also the easiest of all malware infections to fix. The only way to install an Adware is by installing it. So if you want to fix Adware infections, go to Programs and Features, then simply uninstall the program.
    1. Trojan horse – As the name suggests, Trojan horses are malware that looks innocent. The malware file comes in the form of fake Antivirus, Software, Screensaver etc. They mostly use names and logos that are similar to original product to look innocent.
      Trojan horses are usually used to spy for classified details on your computer.
    1. Rootkit – Rootkits are malwares that hides inside the operating system files and attach themselves to it. Rootkit infections are the toughest infection to remove. This is because the Rootkit program is loaded into memory along with operating system files. Also, it is difficult to differentiate between a genuine process and a rootkit process for inexperienced users.
    1. Ransomware – A type of malware that had lot of success recently. The malware encrypts the content on your computer and make it unavailable for the user. A ransom demand is then displayed on your screen. Some users fall for it and pay the ransom amount. Some users even have their bank account emptied out after filling out classified information inside the ransom note.
    1. Fake Security Software – These malwares look similar to other popular Antivirus programs. Users are tricked into installing these programs which then create problems in your computer. Some of these malwares work similar to a Trojan and some like Ransomware.
    1. Keylogger – A malware that record keystrokes and send the details to its owner. From the recorded keystrokes, the malware programmer can get details regarding personal accounts, user names and passwords, bank details, web activity etc.
      Keylogger’s are usually detected without much difficulty by top security software’s. Some secure websites also provide virtual keyboard online in case if you suspect Keylogger installed.
    1. Malicious BHO – BHO is Browser Helper Objects which includes toolbars, add-ons, extensions that add additional functionality to browser. BHO’s are used for additional functionality and simplify your job.
      But Malicious BHO’s gets installed in browsers by pretending as a genuine program. Once installed, these BHO’s can lead to browser crashing frequently, hijacking of home page and search engines, display of ads etc. These BHO’s usually make changes even without asking for user permission.

Use comment section for feedback.

It's only fair to share...Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone

About the author: Anup Raman A Tech Enthusiast|Blogger|Tech Trainer with 10+ yrs experience in the field of IT. My expertise are in Operating Systems, mainly Windows and Computer security which comes from my experience, working as Tech Support and Trainer for Microsoft, Symantec and McAfee. Loves blogging about Technical Troubleshooting, discussing latest Gadgets, Games and doing Reviews.

{ 0 comments… add one }

Leave a Comment

Show Buttons
Hide Buttons