What is Malware?
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruses, ransomware, spyware, trojans, and worms—each with different infection methods and objectives.
Also known as: Malicious Software
Malware is the umbrella term for software that's out to harm you. From ransomware that holds your files hostage to spyware that watches everything you do, malware is the primary threat to digital security.
Types of Malware
Virus
- Attaches to legitimate programs
- Spreads when infected file is shared
- Requires user action to spread
Worm
- Self-replicating
- Spreads automatically across networks
- No user action needed
Trojan
- Disguises as legitimate software
- User installs willingly
- Opens backdoor for attacker
Ransomware
- Encrypts your files
- Demands payment for key
- No guarantee of recovery
Spyware
- Monitors user activity
- Steals personal information
- Often runs hidden
Adware
- Displays unwanted ads
- Often bundled with free software
- May track browsing habits
Rootkit
- Hides deep in system
- Very hard to detect
- Provides persistent access
Infection Vectors
Email Attachments
- Malicious documents (macros)
- Executable files disguised as documents
Drive-by Downloads
- Compromised websites
- Exploit browser vulnerabilities
Software Bundles
- Hidden in free downloads
- "Optional" installations
Removable Media
- Infected USB drives
- Autorun exploits
Network Attacks
- Exploiting unpatched vulnerabilities
- Worms spreading automatically
Protection Measures
Technical
- Keep software updated
- Use reputable antivirus
- Enable firewall
- Run with limited privileges
- Regular backups (offline!)
Behavioral
- Don't open suspicious attachments
- Download from official sources only
- Verify software before installing
- Be skeptical of unexpected files
Recovery
- Disconnect from network
- Boot from clean media
- Scan and remove malware
- Change all passwords
- Restore from backup if needed
Related Terms
Backdoor
A hidden method of bypassing normal authentication or encryption in a computer system. Backdoors may be intentionally built in (for maintenance or surveillance) or secretly inserted by attackers. In privacy contexts, backdoors refer to deliberate weaknesses that allow authorities to access encrypted data.
Keylogger
Malicious software or hardware that records every keystroke typed on a device, capturing passwords, messages, and sensitive information. Keyloggers can be installed through malware, physical access, or malicious browser extensions.
Phishing
A social engineering attack where attackers impersonate legitimate entities through fake emails, websites, or messages to trick victims into revealing sensitive information like passwords, credit card numbers, or personal data.
Have more questions?
Use our guided flow to get the right next privacy step for Malware.
Open Guided Flow