Viruses are a specific piece of malware which replicates itself to further infect other devices, file systems and shares. It generally doesnt require anything to start the replication process, but usually requires some kind of execution to infect the host device.
Crypto-malware is a type of ransomware, which will encrypt all of the data on your computer and hold it to ransom. Demanding financial payment to decrypt it.
Ransomware is a type of malware that will demand payment which usually reflect some kind of action such as threats from the police, pop-ups suggesting your computer is at risk, these are often fake and can be removed by antivirus.
Worms are self replicating pieces of code, which exploit vulnerabilities to traverse and spread throughout a network. They replicate independently and dont require human interaction to start the replication process.
A trojan is a malicious piece of code, usually a keylogger, which hides itself in another piece of software. These are usually disguised as legitimate software, or applications, and can be commonly found on illegitimate websites mimicking the official software vendor.
A rootkit is a code designed to enable continuous privileged access to a hacker once infected.
A keylogger is a piece of software which records or copies keystrokes entered by the user of the device. They have evolved in previous years to allow a third party to see where the key strokes are being entered.
Adware is a way of essentially spamming a user with adverts on the internet. It can cause huge performance issues for a computer and is based around ‘popups’ of adverts. It is usually installed unintentionally or as part of a package of software.
Spyware is malware which is essentially, watching what a user is doing, this could be adverts, which websites a user visits, affiliate marketing, basically sitting in the background gleaming information of your internet usage. This also can cause performance issues to a computer.
Bots or botnets are automated secondary devices which your computer can accidentally become a part of a network of. They are usually enormous networks of other infected computers, generally used to ‘farm’ or perform tasks en-masse such as DDOS’s.
A RAT or Remote Access Tool is a piece of software which allows a malicious party to access your device or computer. They can then observe or control your computer as they please and leave and return since they have this foothold.
- Logic bomb
A logic bomb is a piece of malicious software which requires a ‘trigger’ to action a specific event. This could be a specific time/date to pass or a certain action to occur. these are usually put in place by disgruntled ex-employees or internals.
A Backdoor is a way in which an intruder can return to your network/device should they ever need to. They will usually put this in place and return to the network at a later time/date.