≡ Menu

Types of Malware that can infect your computer

Types of Malware and virus infection

Table of Contents

Spread the love

Has your browser forgotten your homepage? Do you have a problem with the browser not connecting to the internet? Is your computer which used to be fast is crawling now? Do you get frequent pop-ups on the screen?

All these problems are because there is malware or malicious software inside your computer. Malware is a general term used for all computer infections that is designed to create problems and steal information from your computer.

Understanding these different types of malware can help you decide on the course of action needed to fix the problem.

Types of malware

    1. Virus - Virus is a malware program that can spreads to other programs when you run it. The malware program is usually in the form an executing file. Most virus files are harmless until you click and execute the program. Once executed it infect files, mainly system files which is responsible for creating the problem.
    1. Spyware – This malware is used for the purpose of spying on your computer. The purpose of spying varies from genuine cases such as understanding browser habits, location, trends etc. to the malicious purpose such as gather credit card details, social security number etc.
    1. Worm - Worms are similar to Virus except that it doesn’t need a user to do anything to start infecting. It is designed to replicate itself. Once inside the network, it replicates and tries to infect other devices inside the network.
    1. Adware - Adware malwares are annoying by displaying pop-ups, ads, and change browser links. But this is also the easiest of all malware infections to fix. The only way to install an Adware is by installing it. So if you want to fix Adware infections, go to Programs and Features, then simply uninstall the program.
    1. Trojan horse - As the name suggests, Trojan horses are malware that looks innocent. The malware file comes in the form of fake Antivirus, Software, Screensaver etc. They mostly use names and logos that are similar to the original product to look innocent.
      Trojan horses are usually used to spy for classified details on your computer.
    1. Rootkit - Rootkits are malwares that hide inside the operating system files and attach themselves to it. Rootkit infections are the toughest infection to remove. This is because the Rootkit program is loaded into memory along with operating system files. Also, it is difficult to differentiate between a genuine process and a rootkit process for inexperienced users.
    1. Ransomware – A type of malware that had a lot of success recently. The malware encrypts the content on your computer and makes it unavailable for the user. A ransom demand is then displayed on your screen. Some users fall for it and pay the ransom amount. Some users even have their bank account emptied out after filling out classified information inside the ransom note.
    1. Fake Security Software – These malwares look similar to other popular Antivirus programs. Users are tricked into installing these programs which then create problems on your computer. Some of these malwares work similar to a Trojan and some like Ransomware.
    1. Keylogger – A malware that records keystrokes and sends the details to its owner. From the recorded keystrokes, the malware programmer can get details regarding personal accounts, usernames and passwords, bank details, web activity etc.
      Keyloggers are usually detected without much difficulty by top security software’s. Some secure websites also provide virtual keyboard online in case if you suspect Keylogger installed.
    1. Malicious BHO – BHO is Browser Helper Objects which includes toolbars, add-ons, extensions that add additional functionality to the browser. BHO’s are used for additional functionality and simplify your job.
      But Malicious BHO’s gets installed in browsers by pretending as a genuine program. Once installed, these BHO’s can lead to browser crashing frequently, hijacking of homepage and search engines, display of ads etc. These BHO’s usually make changes even without asking for user permission.

Use the comment section for feedback.

{ 0 comments… add one }

Leave a Comment