5 Types of Malware
Insight to a few types of popular malware hackers use
Trojan Horse
Worms
Ransomware
Adware
Viruses
What is Malware?
Reference Page
About Viruses
Virues are one of the many types of malware that can infect a users digital device. This type of malware is infilrated into a persons device via a code that is attached to a file. This type of malware can gather the users data, in which it can be modified or deleted by the invasive program. Viruses can infect all programs of the users device once the code is planted in the device.
This paragraph is ready to hold stunning creativity, experiences and stories.
Back to home
About Worms
Worms infect a users device via attachimg to other files to worm their way through the users systems. They work by replicating themselves through the users network, furtherng the infection of the device. Worms do not need a host program to spread, unlike viruses which cannot run by themselves. The affect of this malware is slowed network speeds. They are able to spread very quickly throughout the users device.
Back to home
About Trojan Horses
The Trojan Horse virus gets its name by the tactic that the Greeks had used to invade the city of Troy. This malware is sneaky as it is disguised as a link to play an online game or a visually appealing computer application. This malware works through attaching itself to image or audio files.
Back to home
About Ransomware
Ransomware works by demanding a payment by the user once the program has infected the computer. The program gathers data off of the users device and uses it as leverage by threatening to leak or sell the data retreived. The malware freezes the users device, where no other applications can be opened or closed until the victim pays the demanded amount of money to the criminals. Once the payment is sent, the users gets access back to their device. This type of malware is common among the elderly due to the liklihood of them having large amounts of money. The hackers take advantage of the elderlys lack of cybersecurity knowledge.
Back to home
About Adware
Adware works by showing ads on the users device that trick the user to clicking on them. Users clicking on the ads generates profit for the people supplying the software. This type of malware is not harmful but can lead to annoyance and possible other viruses entering the users device.
Back to home
References
GeeksforGeeks. (2023, May 30). Malware and its types. GeeksforGeeks. https://www.geeksforgeeks.org/malware-and-its-types/ What is malware?. IBM. (n.d.-a). https://www.ibm.com/topics/malware
Back to home
What is it used for?
What is malware?
- Hold data hostage for large sumps of money
- Gain access for private information
- Hack business networks to disrupt their systems
- Steal login credentials such as passwords, credit card numbers, and personal information
"Malware—short for "malicious software"—is any software code or computer program intentionally written to harm a computer system or its users" (IBM).
Back to home
Vertical Mind Map
Cody Hallock
Created on December 17, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Body Parts
View
Choice Board Flipcards
View
January School Calendar
View
Genial Calendar 2026
View
School Calendar 2026
View
January Higher Education Academic Calendar
View
School Year Calendar January
Explore all templates
Transcript
5 Types of Malware
Insight to a few types of popular malware hackers use
Trojan Horse
Worms
Ransomware
Adware
Viruses
What is Malware?
Reference Page
About Viruses
Virues are one of the many types of malware that can infect a users digital device. This type of malware is infilrated into a persons device via a code that is attached to a file. This type of malware can gather the users data, in which it can be modified or deleted by the invasive program. Viruses can infect all programs of the users device once the code is planted in the device.
This paragraph is ready to hold stunning creativity, experiences and stories.
Back to home
About Worms
Worms infect a users device via attachimg to other files to worm their way through the users systems. They work by replicating themselves through the users network, furtherng the infection of the device. Worms do not need a host program to spread, unlike viruses which cannot run by themselves. The affect of this malware is slowed network speeds. They are able to spread very quickly throughout the users device.
Back to home
About Trojan Horses
The Trojan Horse virus gets its name by the tactic that the Greeks had used to invade the city of Troy. This malware is sneaky as it is disguised as a link to play an online game or a visually appealing computer application. This malware works through attaching itself to image or audio files.
Back to home
About Ransomware
Ransomware works by demanding a payment by the user once the program has infected the computer. The program gathers data off of the users device and uses it as leverage by threatening to leak or sell the data retreived. The malware freezes the users device, where no other applications can be opened or closed until the victim pays the demanded amount of money to the criminals. Once the payment is sent, the users gets access back to their device. This type of malware is common among the elderly due to the liklihood of them having large amounts of money. The hackers take advantage of the elderlys lack of cybersecurity knowledge.
Back to home
About Adware
Adware works by showing ads on the users device that trick the user to clicking on them. Users clicking on the ads generates profit for the people supplying the software. This type of malware is not harmful but can lead to annoyance and possible other viruses entering the users device.
Back to home
References
GeeksforGeeks. (2023, May 30). Malware and its types. GeeksforGeeks. https://www.geeksforgeeks.org/malware-and-its-types/ What is malware?. IBM. (n.d.-a). https://www.ibm.com/topics/malware
Back to home
What is it used for?
What is malware?
"Malware—short for "malicious software"—is any software code or computer program intentionally written to harm a computer system or its users" (IBM).
Back to home