Categories: NewsSecurity

Top 4 Types of Malware To Watch For

Virus, malware, trojans–TV shows like Mr. Robot have shown the general population what these dangerous pieces of software can cause. Here are the top four most threatening types of viruses one can encounter.

For years, they have infected all kinds of systems, to the point that many are still remembered with fear. Unfortunately, the Internet is a dangerous place, and computer viruses are something we will always have to deal with.

Computer viruses have the objective of infecting files and programs installed on our machines by hosting themselves in our operating systems. They are called viruses because their modus operandi share similarities with their biological counterparts; both try to insert themselves into an environment–machines or human bodies–and infect a section.  From that point on, they wreak havoc. The idea is that every ‘corrupt’ machine becomes a new source of infection.

Malware, a more broad term to describe computer viruses, are capable of causing destructive effects, even irreparable ones, in any computing system. These types of programs execute themselves when users inadvertently run an infected file or software. A virus is a term used to describe a form of malware that is designed to host itself on a computer’s volatile memory (the RAM).  In this way, the virus can take control of a particular process in the machine (a web browser for example), and remain active even if its target is closed.

Several of the most popular malware to ever be released include Blaster, (which targeted Windows XP machines and included a message to Bill Gates encouraging him to ‘fix’ Windows), Bagle, Netsky, Conficker, Melissa, ILoveYou (which managed to infect several computers at the Pentagon), and Morris (which reached NASA offices).

These are just a few examples of the many programs that have caused headaches and despair over the last 20 years. There are four main categories of malware.  Let’s take a look.

Related Post

Logic Bombs

Although their popularity has declined, logic bombs can still pose a threat. They are designed to execute themselves at a specific time or after a specific action was performed at the victim’s end. A recent example of a logic bomb is Shamoon. This malware was created several years ago, but it has recently resurfaced to attack thousand of computers in six important Saudi organizations.

Worms

These are self-replicating menaces that go from computer to computer through emails, photos, files, and networks. Recent threats include Conficker, a sophisticated malware that used several techniques to build a botnet (zombie computers) on millions of devices.

Trojans

This is a type of malware that comes embedded inside a legitimate software. Trojans seek to create backdoors in a computer to allow further infections or to send sensitive data back to the attacker. Computers aren’t the only ones at risk; a trojan named Tordow has been infecting Android devices by disguising itself as a rooting app. This malware enables the attacker to use all the phone’s main functions and to steal data.

Macro Virus

These are similar to a script, but are associated with a specific program like documents or spreadsheets. Macro viruses are often used as a way to infect a machine with other established or more dangerous malware. Microsoft Office’s macro language is one of the most targeted, due to their huge market cap.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Eduardo Gómez

Eduardo Gómez is a Computer Science Major from Venezuela, a country with a loyal Bitcoin user base. He discovered Bitcoin in 2012 and now he use it to escape the triple-digit inflation that Venezuela suffers, he is focusing on developing a writing career, and he tries to keep up with the news in FinTech and Blockchain Technologies.

Share
Published by
Eduardo Gómez

Recent Posts

BEFE Coin: The MEME Coin Revolutionizing Wealth Creation

Do you know about BEFE? This relatively nascent coin is now the talk of the…

6 hours ago

Bitgert Coin: The Crypto Revolutionizing the Market

Indeed, the list of altcoins continues to grow in the crypto world and that’s why…

6 hours ago

Arweave ($AR) Leads Daily Gainers With 17% Surge On Coinmarketcap

Today, the decentralized storage network Arweave ($AR) has captured the spotlight as the top daily…

15 hours ago

Arbitrum Recovers To $1 Amidst Development Activity Surge

Today marked a slight resurgence for Arbitrum as it reclaimed its $1 trading price, following…

16 hours ago

BlockDAG Eclipse Top Crypto Coins Amid Shiba Inu Dips & Avalanche Staking.

Best Crypto to Buy: BlockDAG’s Moonshot Keynote Sparks $22.2M Presale, Eclipsing Shiba Inu And Avalanche…

24 hours ago

Solana Meme Coins Bonk (BONK) And (MEW) Fail To Make New ATH, ETFSwap (ETFS) Presale Explodes

The once-booming trend of Solana meme coins appears to be reaching its twilight. Backed by…

1 day ago