Malware | Description |
Worm | Malware that propagates itself from one infected host to other hosts via exploits in the OS interfaces typically the system-call interface |
Trojan | Malware that masquerades as non-malware and acts maliciously once installed (opening backdoors, interfering with system behavior, etc.) |
Adware | Malware that forces the user to deal with unwanted advertisements |
Spyware | Malware that secretly observes and reports users’ computer usage and personal information accessible |
Botnet | Malware that employs a user’s computer as a member of a network of infected computers controlled by a central malicious agency |
Rookit | Malware that hides its existence from other applications and users. Often used to mask the activity of other malicious software |
Virus | Malware that attaches itself to running programs and spreads itself through users’ interaction with various systems |
Polymorphic Virus | A virus that when replicating to attach to a new target, alters its payload to evade detection, i.e., takes on a different shape but performs the same function |
Metamorphic Virus | A virus that when replicating to attach to a new target, alters both the payload and functionality, including the framework for generating future changes |
Ransomware | Malware that encrypts the user’s files (documents and photos) with a strong form of encryption and demands payments in exchange for the decryption key |