Malware is short for “malicious software.” It is a broad term that refers to any software, program, or code that is designed to infect and damage a computer—and it includes viruses. There are a lot of different types of malware, and they all inflict harm in multiple ways. It helps to understand what kinds of malware are out there and how you can defend yourself against them.
Understanding Malware and Other Malicious Software
What is ransomware?
This type of malware is also referred to as scareware. It can lock down certain files or your entire computer and hold them hostage.
Ransomware works in two ways—it either encrypts your files and threatens to delete them or locks you out of your computer completely. The perpetrators of ransomware attacks threaten to destroy everything unless a users pay a ransom.1 Most of the time, ransomware targets large organizations because they have the most to lose and the most resources available to pay.
What is anti-ransomware?
In light of continued ransomware attacks, computer security companies have developed anti-ransomware that that can either prevent an attack or release a computer from the ransomware without any money changing hands. You can get a tool dedicated to rooting out and destroying ransomware threats or find an antivirus program that includes anti-ransomware in its features.
What is spyware?
This is malicious software designed to spy on you. It runs in the background and captures your online activity. It can grab passwords, bank information, credit card numbers, and your browsing history.
What is anti-Spyware?
Anti-spyware is designed to identify and remove spyware programs. Anti-spyware programs use rules-based methods and definition files to detect known spyware programs.
Fortunately, if spyware has already infected your computer, you can find it and get rid of it with an anti-spyware program. Anti-spyware can be added as a stand-alone defense or included as part of a comprehensive antivirus package.
What is a worm?
A computer worm is a type of malware created to make a device inoperable. Worms can self-replicate to clog up the device's resources. Worms hide in parts of the operating system that are automatic and hard for a user to detect. You typically won’t notice a worm until its out-of-control replication starts using up enough computer resources to slow down or disrupt computer function.
How to prevent computer worms
One of the best ways to keep your computer worm-free is to keep your operating systems and software updated with the latest security patches. Firewalls and antivirus software are other effective defenses against a computer worm. And don’t click on links or open files from unknown sources.
What is a Trojan?
Named after the famous horse, Trojan malware either hides within or disguises itself as legitimate software. It’s a sneaky form of malware that creates holes and backdoors in your security so other malware can get in.
How to avoid a Trojan virus
The good news is that Trojans need permission to run on your machine, so the best defense is to stay away from links and attachments from sources you don’t recognize. Keeping software and operating systems updated and using antivirus software will also help keep the doors locked against a Trojan virus.
Learn more about how to tell if a website is safe.
What is adware?
This sort of malware isn’t always malicious, but it can still cause damage by slowing down your system and bombarding you with pop-ups. Adware isn’t designed to destroy your computer or steal your data—it wants to get you to buy whatever it’s selling.
How to remove adware
Getting adware off your computer can be a frustrating process, but it’s worth it. To wipe the slate clean, you want to completely disconnect from the internet, uninstall the programs through the Control Panel, and scan your computer to make sure you got everything. You can also use a spyware removal tool like MalwareBytes (it’s free) to scrub your machine clean.
Some adware can regenerate after you go back online, so be sure to reset your browser settings before logging back on. Another tactic is to install an ad blocker, which may block malicious ads so they never get to you. But be careful to select a legit ad blocker, because there are some fakers out there that could be dangerous.2
What is a rootkit?
A rootkit lets someone other than you access and take control of your computer. And it does it without you knowing that it’s happening. The owner of a rootkit can covertly change system settings, access files, and monitor user activity. There are some legitimate uses for rootkits (usually by law enforcement, parents, or employers), so they’re not always considered malware.
How to get rid of rootkits
Wiping out rootkits on your computer isn’t as straightforward as detecting and removing other forms of malware. There is no specially designed program that finds and removes rootkits. That means getting rid of rootkits could be as simple as giving your system a good cleaning or as complicated as a complete rebuild.
Related articles on SafeWise
- David Bisson, Tripwire, "10 of the Most Significant Ransomware Attacks of 2017," December 2017. Accessed March 29, 2022.
- Aatif Sulleyman, Independent, "Google Chrome Users Tricked into Downloading Fake Ad Blocker." Accessed March 29, 2022.
Compare the best internet security products
|Best parental control||$99.00/yr.||Unlimited devices||Email and social media monitoring||View Plans||Read review|
|Best antivirus/malware software||$19.99/yr.||Protects up to 5 devices||Includes VPN and parental controls||View on Amazon||Read review|
|Best VPN||$11.99/mo.||Works on 6 devices||5,100 servers|
|View Plans||Read review|
|Best identity theft protection||$17.95/mo.|
$1 million recovery insurance
|Two-factor authentication||View Plans||Read review|
|Best password manager||$0.00||Unlimited devices with Premium plan||VPN and dark web monitoring with Premium plan||View Plans||Read review|
Data as of post date. Offers and availability may vary by location and are subject to change. SafeWise uses paid Amazon links.