Apps & OS

What Is Malware and How Can You Prevent It?


The term Malware or malicious software refers to software dangerous are usually made to perform criminal acts. Malware is usually used by cyber criminal to steal data, cause chaos, and damage devices.

Malware Malware

The stolen data can be in the form of credit card data, health records, personal email and passwords, personal identities, and even mining bitcoin or other cryptocurrencies.

However, there are also malware that are created for other purposes such as tools to test the security of a device, protests, and even weapons of intergovernmental warfare.

Quoted from the official McAfee blog, Monday (28/12/2020), since its appearance more than 30 years ago, malware has discovered several methods of attack.

For example entering via e-mail attachments, malicious advertisements on popular sites (malvertising), fake software installations, infected USB drives, infected applications, phishing emails, and even text messages.

Types of Malware

Launching AVG and Kaspersky, malware is a general term for malicious software. Understanding the different types of malware is one way to help protect users’ data and devices. The following is a list of the most common types of Malware.


Viruses are malicious software that are usually attached to documents or files. Once downloaded, the virus will not be active until the document or file that has been infected with the virus is opened and used by the user.

Viruses are designed to interfere with system operation on the user’s device. As a result, viruses can cause significant operational problems and users can lose data.


Worm-type malware can reproduce itself and spread independently to other devices. Worms usually enter the system via a network connection or from downloaded files.

Unlike viruses, once entered, worms can work and reproduce themselves without requiring any human activation or intervention. This type of malware can also spread directly across networks or via an internet connection.

Trojan viruses

This type of malware usually disguises itself as a harmless application, thereby deceiving users. But once the user downloads and uses it, the trojan virus can then spy and steal sensitive data on the user’s device.

In addition, because of its stealthy nature, trojan viruses can also open back door access to the user’s device system and do various things such as delete, block, modify, and copy data, as well as disrupt computer performance. Unlike other types of viruses and worms, trojans are not designed to reproduce by themselves.


As the name implies, this type of malware is designed to enter devices, collect device user data, and send it to third parties without the user’s consent. Spyware is usually implanted on a device without the user’s explicit knowledge.

This type of malware can record all forms of activity on the device, from personal information to internet browsing details such as passwords, credit card numbers, and surfing habits.


Different from others, this type of malware is usually used by cybercriminals to threaten and ask for ransom from the user of the device.

Ransomware is a criminal money-making scheme that can be posted via fraudulent links in e-mails, instant messages or websites. It has the ability to lock the computer screen or encrypt important files that have been previously set with a password.


Adware usually displays flashing advertisements or pop-up windows when the user performs certain actions. While not always dangerous, aggressive adware can compromise device security, for example helping to deliver malware, which often includes spyware. Adware is more invasive and irritating when it appears on a user’s device.


Botnets are networks of hijacked computer devices that are used to carry out various frauds and cyber attacks. The term “botnet” comes from the words “robot” and “network”.

Botnet assembly is usually the infiltration stage of a multi-layer scheme. Bots function as tools to automate mass attacks, such as data theft, server crashes and malware distribution. Botnets use your device to deceive others or cause interference, without the user’s consent.

How to Protect Your Device from Malware

While there are many types of malware out there, the good news is, there are many ways to protect yourself from malware.

  • Always update the operating system and applications.
  • Download Anti-Virus software from a reputable company through their website or official retail store.
  • Never click on unknown links or advertisements.
  • Beware of emails asking for personal information.
  • Keep downloading official apps.
  • Be careful when surfing and downloading files on the internet.


Leave a Reply

Your email address will not be published. Required fields are marked *