Malware, Ransomware, Virus… What’s the Difference?

Like it or not, cyberspace is full of cybercrime. Hackers keep finding novel ways to take advantage of security flaws and breach organizations. Common weapons these cyber actors use include malware and viruses, and a widely-used technique for network infiltration is phishing.

But the breakdown of cybercrime goes much further. Since cyberattacks are an eventuality, wouldn’t you like to get familiar with the types and terminology?

Malware

malware, ransomware, phishing, virus, rootkit, cyberattack, cyber threat
Malware (any malicious software) is specifically designed to secretly infect and damage your computer. It is introduced in a number of ways including:

• Through malware attachments in an email or instant message
• Through sharing infected files
• Through an infected USB stick
• From an infected website

Virus

A type of malware, a virus is a contagious piece of code that attacks the software of your computer. It inserts itself into another program then multiplies and spreads on its own once it has been introduced into the system.

Spyware

Spyware does just what its name infers. It is malware that spies on you and monitors your internet activity. It helps the bad guys collect information about you and your computer without your knowledge or consent.

Worm

Malware that copies itself and destroys information and files saved on a computer. Like a virus, worms replicate copies of themselves that leave infections across a network. Unlike viruses, worms do not require a host program to circulate and can travel through a network unaided.

Trojan

A Trojan is a type of attack named after the wooden horse the Greeks used to enter the city of Troy. It is malware the victim believes to be a legitimate program and runs it. However, it is actually designed to steal personal and financial information. It later takes over the computer’s system files. Unlike worms and viruses, they require user interaction to spread and cannot self-replicate.

Ransomware

Ransomware is designed to restrict access to your systems and files until you pay a ransom. Advanced ransomware often encrypts the victim’s files and the hackers demand a ransom for decryption.

Phishing

Phishing is different from malware and the different types of malware. It is a bad guy’s attempt to get your personal login information to gain control of your email, social network account, or online bank account.

Backdoor

An unknown point of access to a system that bypasses authentication techniques. Backdoors provide easier access to a compromised system.

Adware

Generates revenue by producing advertisements presented to the infected device’s user. Adware can be lucrative for the creator but is not dangerous like other malicious software.

Rootkit

Rootkits mask their existence (or mask the existence of other malwares) on a network by intercepting and changing API calls that provide system info. The goal is to gain unauthorized access and control over a computer or system.

There are many threats to be aware of in the cyber landscape. Bad actors will attempt to compromise you, which means you need to be prepared. Familiarize yourself with the terminology and educate yourself on what you need protection against. Employ solutions that can advance with the threat landscape and provide visibility into your entire security environment. Get the C-suite on board to sponsor security initiatives and help educate your organization on cybersecurity awareness.

Should you find you need us, we’re here to help.

By Using the KineticFuse.com site you agree with our use of cookies. See our PRIVACY POLICY for more details. I Understand
Cybersecurity down for