Virus is the most common type of malware that hits almost every system. For affecting the system, it requires a user to click and copy it to the media host. Most viruses self replicate them without the user’s knowledge. They can also spread instantly via email or network connections.
Most users are totally unaware of the fact that their every single action is being monitored. That usually logs a user’s keystrokes and sends data to the threat user. Key loggers can be a physical wire connected to a peripheral like a keyboard or installed by a Trojan virus.
Worms can also replicate themselves like keyloggers and make full copies, segments of their own. They are also attached by email attachments or network connections but unlike viruses, however, a worm does not require a host program in order to run, self-replicate, and propagate. Once infected, worms spread quickly over the internet and computer networks.
This virus is disguised as a legitimate threat to your network or files. It hides in your computer system and does not attack unless it’s called to perform the attack. Social engineering tactics are typically deployed to trick users into loading and executing Trojans on their systems. When activated, it can also allow threat actors to spy on you.
This attack usually happens when you face a denial of access, and it does not let you access until the ransom is paid. It usually locks the user out of their systems, encrypts user files, and requires payment.
Logic bombs are triggered on a particular date or time; the damage caused by logic bombs varies from changing bytes of data to making hard drives unreadable. It can also lie dormant in your system for years.
Botnets are shot form of reBOT Net is a group of a network whose security has been compromised. The Mirai botnet gained access to the internet of things connected devices like DVR, home printer.
Adware & Spyware
These both are designed as unwanted software, which aware intends to serve advertisements on screens on a web page. On the other hand, spyware is a type of malware designed to gain access and damage your computer.
Rootkits allow threat actors to maintain command and control with the user knowing; this is called back door threat. The controller can then log files, spy on the owner’s usage, execute files, and change system configurations remotely.