Viruses, trojans, malware, worms - what's the difference? (2024)

Much of the confusion around the different types threat arise from the difference between focusing on what each one is and what each one does.

Phishing scams

Phishing attacks take many forms – malicious emails, fake web forms, pharming – but the ultimate aim of each is to gain access to private information. At the heart of phishing attacks is deception. Each attacker is attempting to convince you they are a person or brand you are familiar with.

Read our in-depth guide to phishing scams and how to avoid them.

Ransomware

Ransomware, for example, will hold your most sensitive (or indeed, all) your files hostage until you pay a ransom, but it could get onto your computer via a trojan, virus or worm.

Worms

Much like viruses (and arguably a sub-class of them), worms differ in one key way: viruses require an action on the part of the user for them to spread, or for the initial infection to take place. For example, receiving a malicious file attached to an email would require you to open the file for a virus to execute.

Worms, on the other hand, need no such interaction and can happily replicate and spread to different computers (on a network or via a USB key, for example) with no warning whatsoever.

This makes worms potentially more dangerous than viruses, trojans or other malware, as they're harder to contain.

While traditional anti-virus software will take care of a lot of the better-known viruses and trojans, the ability to replicate itself to networked resources without any interaction makes containing a worm a much harder task.

Doxing

In a doxing attack, hackers publicly release personal information about one or more individuals. In 2011, a hacking collective associated with Anonymous posted the names and addresses of dozens of LAPD officers online after accusing the department of shutting down the Occupy L.A. Movement. In 2015, Anonymous itself then released the names of hundreds of people allegedly associated with the Ku Klux Klan.

A US hacker, Mira Islam, was sentenced to two years in prison in 2016 after posting the names, addresses and phone numbers of dozens of celebrities including Michelle Obama, Jay Z and Ashton Kutcher. The US Department of Justice said the information was used by "countless others" in subsequent fraud attacks.

Baiting

Baiting attacks exploit the curiosity or greed of unsuspecting victims. A hacker may plant a USB stick loaded with malware in the lobby of a business. If an employee then put that USB into their work computer – perhaps because it had the logo of a rival company on it – it could install malware onto the company's internal computer network. Emails with intriguingly named files attached, or websites that offer free downloads, may also be baiting scams designed to trick people into downloading viruses onto their computers.

How to keep yourself safe

If you've ended up at this page and already have a virus, trojan or worm on your computer, you'll need some help to remove it.

GCHQ recently gave WIRED five top tips on staying safe online.

As ever though, prevention is the best medicine, so be sure to keep your anti-virus and other software up-to-date.

This article was originally published by WIRED UK

Viruses, trojans, malware, worms - what's the difference? (2024)
Top Articles
What Does 'Skill Issue' Mean in the Workplace? • Toggl Hire
UML Use Case Diagram Tutorial
Jack Doherty Lpsg
Nullreferenceexception 7 Days To Die
Lowe's Garden Fence Roll
Golden Abyss - Chapter 5 - Lunar_Angel
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Splunk Stats Count By Hour
Klustron 9
Sinai Web Scheduler
Tv Schedule Today No Cable
Derpixon Kemono
Mawal Gameroom Download
Scholarships | New Mexico State University
Lonadine
Job Shop Hearthside Schedule
Los Angeles Craigs List
RBT Exam: What to Expect
Minecraft Jar Google Drive
Hocus Pocus Showtimes Near Amstar Cinema 16 - Macon
Curry Ford Accident Today
Exterior insulation details for a laminated timber gothic arch cabin - GreenBuildingAdvisor
Nurse Logic 2.0 Testing And Remediation Advanced Test
We Discovered the Best Snow Cone Makers for Carnival-Worthy Desserts
Craigslist Lakeville Ma
Woodmont Place At Palmer Resident Portal
UMvC3 OTT: Welcome to 2013!
Toothio Login
Why Are Fuel Leaks A Problem Aceable
Regina Perrow
Dal Tadka Recipe - Punjabi Dhaba Style
Cylinder Head Bolt Torque Values
Kristy Ann Spillane
Why comparing against exchange rates from Google is wrong
Craigs List Tallahassee
Craigslist Central Il
Instafeet Login
Ise-Vm-K9 Eol
The Best Restaurants in Dublin - The MICHELIN Guide
Sam's Club Gas Prices Deptford Nj
Nba Props Covers
Letter of Credit: What It Is, Examples, and How One Is Used
Shell Gas Stations Prices
Coffee County Tag Office Douglas Ga
Citymd West 146Th Urgent Care - Nyc Photos
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
Egg Inc Wiki
German American Bank Owenton Ky
Cvs Minute Clinic Women's Services
Where To Find Mega Ring In Pokemon Radical Red
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 5505

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.