Malware means “malicious software” and is designed to gain access to or install malicious software on a computer without the user’s consent. They perform unwanted actions on the host computer for the benefit of a third party. There is a whole range of malware that can severely degrade the performance of the host machine. There is a whole range of malware that is written just to distract/annoy the user, complex malware that capture sensitive data from the host machine and send it to a remote server. There are different types of malware present on the internet. Some of the popular ones are:

1. Adware: This is a special type of malware that is used for forced advertising. They either redirect the page to an advertisement page or pop-up an additional page that promotes a product or event. These adware are financially supported by the organizations whose products are advertised.

2. Spyware: It is a special type of spyware that is installed in the target computer with or without the user’s permission and is designed to steal sensitive information from the target machine. Mostly it collects the user’s browsing habits and sends it to a remote server without the knowledge of the computer owner. Most of the time they are downloaded to the host computer while downloading freeware i.e. free application programs from the Internet. Spyware can be of different types; it can keep track of the host computer’s cookies, it can act as keyloggers to sniff out banking passwords and sensitive information, etc.

3. Browser Hijacking Software: There are some malicious software which are downloaded along with free software available on the internet and installed in the host computer without the knowledge of the user. This software modifies the browser setting and redirects links to other unknown sites.

4. Virus: Virus is a malicious code written to harm/damage the host computer by deleting or adding a file, occupying the computer memory space by copying the code, slowing down the computer performance, formatting the host machine, etc. It can be spread through email attachments, pen drives, digital images, e-greetings, audio or video clips, etc. The virus may be present in the computer but it cannot activate itself without human intervention. The virus cannot be activated in the host machine unless the executable file (.exe) is executed.

5. Worms: They are a class of viruses that can replicate themselves. They differ from viruses by the fact that they do not require human intervention to travel over the network and spread from the infected machine across the network. Worms can spread either through the network, using operating system flaws or through email. The replication and spread of the worm on the network consumes network resources such as space and bandwidth and forces the network to be blocked.

6. Trojan Horse: Trojan horse is a malicious code that is installed in the host machine by pretending to be useful software. The user clicks on the link or downloads the file that pretends to be a useful file or software from a legitimate source. It not only harms the host computer by manipulating the data but it also creates a backdoor in the host computer so that it can be controlled by a remote computer. It can become a part of a botnet (robot-network), which is a network of computers that are infected with malicious code and controlled by a central controller. The computers in this network that are infected with malicious code are called zombies. Trojans neither infect nor replicate to other computers in the network.

7. Scareware: The Internet has changed the way we talk, shop, play, etc. It has also changed the way criminals target people for ransom. While surfing the Internet, suddenly a pop-up alert appears on the screen warning the user about the presence of dangerous viruses, spyware, etc. in the computer. As a remedial measure, the message suggests that the user download the full paid version of the software. As soon as the user starts downloading, a malicious code, known as scareware, is downloaded to the host computer. It holds the host computer hostage until the ransom is paid. The malicious code can neither be uninstalled nor the computer can be used until the ransom is paid.

Read Also:

  1. Introduction To Cyber Crime
  2. Cyber Security/Crime
  3. Cyber Crime / Part -Time Job / Pongi Scheme Scam Through Fraud / Investment
  4. What Does Intruder Means
  5. Cyber Crime Against Women And Children
  6. Fraud In Mobile Financial Services: Safety Of Consumers, Providers And Systems
  7. Disability And Pension Benefits
  8. Health Care Fraud
  9. Online Romance Scam
  10. Causes And Types Of Cyber Crimes
  11. Something About Cyber Crime
  12. Big Awareness Alert: Fraudulent Contact Numbers And Playboy Job Scams In India
  13. Cyber Crime In India
  14. Cyber Fraud And Fraud Types You Should Be Aware
  15. Fraud And Scams
  16. Prevention Of Cyber Financial Fraud Scams: Role And Responsibility Of International Organizations
  17. Fraud Scams
  18. Common Types Of Health Fraud Scams
  19. Skokka, Oklute And Locanto Platforms Sex Romance Frauds Scams Are Increasing Day By Day
  20. Real History Frauds And Scams Of BJP Government
  21. Preventive Measures From Matrimonial Fraud And Scams
  22. What Are Matrimonial Frauds and Scams
  23. Types Of Scams And Frauds
  24. Types Of Frauds And Scams
  25. What Are Fraud And Scams
  26. Artificial Intelligence: How Fraud Happens Through Voice, How To Avoid It
  27. Immediate Requirement Of Judicial Reforms To Deal With Financial Fraud And To Ensure Compensation For Victims
  28. Bribery And Threats After Online Dating Or Romance Scams
  29. Public Warning: Beware Of Online Dating And Romance Scams Connected To These Bank Accounts
  30. ED Enforcement Direactorate (ED) Department Action On Anil Ambani Companies Completed: Raids At 35 Places In 3 Days; ₹ 3000 Crore Loan Fraud Allegations
  31. Investigation Of India Digital Financial Scenario: A Comprehensive Study Of Cyber Fraud Trends And Digital Literacy In India
  32. Fraud Scam Of Escort Agencies
152410cookie-checkMalware And Its Types
Sunil Saini

Recent Posts

Cyber Crime In India

The number of internet users in India is more than 560 million, which is the…

56 years ago

Important Information About Cyber Crime

Cyber crime is a crime that involves computers and networks. Finding any computer at a…

56 years ago

India’s Cyber Security Challenges: Threats And Solution Strategies

As the world is moving forward in the field of digitalization, the threat of cyber…

56 years ago

Cyber Crime Or Computer Oriented Crime

Digital world creates conditions where nothing remains confidential or secret.’ Has the present world really…

56 years ago

Cyber Crime In India: Types, Vulnerability And Solutions In India

‘Cybercrime in India’ is the term used to describe criminal activities involving a computer or…

56 years ago

Role Of Police In Integrity And Awareness

Police is an organization of the government, which has to work promptly to maintain law…

56 years ago