Viruses, trojans, malware, worms - what's the difference? (2024)

Much of the confusion around the different types threat arise from the difference between focusing on what each one is and what each one does.

Phishing scams

Phishing attacks take many forms – malicious emails, fake web forms, pharming – but the ultimate aim of each is to gain access to private information. At the heart of phishing attacks is deception. Each attacker is attempting to convince you they are a person or brand you are familiar with.

Read our in-depth guide to phishing scams and how to avoid them.

Ransomware

Ransomware, for example, will hold your most sensitive (or indeed, all) your files hostage until you pay a ransom, but it could get onto your computer via a trojan, virus or worm.

Worms

Much like viruses (and arguably a sub-class of them), worms differ in one key way: viruses require an action on the part of the user for them to spread, or for the initial infection to take place. For example, receiving a malicious file attached to an email would require you to open the file for a virus to execute.

Worms, on the other hand, need no such interaction and can happily replicate and spread to different computers (on a network or via a USB key, for example) with no warning whatsoever.

This makes worms potentially more dangerous than viruses, trojans or other malware, as they're harder to contain.

While traditional anti-virus software will take care of a lot of the better-known viruses and trojans, the ability to replicate itself to networked resources without any interaction makes containing a worm a much harder task.

Doxing

In a doxing attack, hackers publicly release personal information about one or more individuals. In 2011, a hacking collective associated with Anonymous posted the names and addresses of dozens of LAPD officers online after accusing the department of shutting down the Occupy L.A. Movement. In 2015, Anonymous itself then released the names of hundreds of people allegedly associated with the Ku Klux Klan.

A US hacker, Mira Islam, was sentenced to two years in prison in 2016 after posting the names, addresses and phone numbers of dozens of celebrities including Michelle Obama, Jay Z and Ashton Kutcher. The US Department of Justice said the information was used by "countless others" in subsequent fraud attacks.

Baiting

Baiting attacks exploit the curiosity or greed of unsuspecting victims. A hacker may plant a USB stick loaded with malware in the lobby of a business. If an employee then put that USB into their work computer – perhaps because it had the logo of a rival company on it – it could install malware onto the company's internal computer network. Emails with intriguingly named files attached, or websites that offer free downloads, may also be baiting scams designed to trick people into downloading viruses onto their computers.

How to keep yourself safe

If you've ended up at this page and already have a virus, trojan or worm on your computer, you'll need some help to remove it.

GCHQ recently gave WIRED five top tips on staying safe online.

As ever though, prevention is the best medicine, so be sure to keep your anti-virus and other software up-to-date.

This article was originally published by WIRED UK

Viruses, trojans, malware, worms - what's the difference? (2024)
Top Articles
VI. Our vision, mission and values
Write My Essay – Private Essay Writing Services from Masters UK
Tattoo Shops Lansing Il
Rubratings Tampa
The Pope's Exorcist Showtimes Near Cinemark Hollywood Movies 20
Corpse Bride Soap2Day
Learn How to Use X (formerly Twitter) in 15 Minutes or Less
United Dual Complete Providers
California Department of Public Health
Colorado mayor, police respond to Trump's claims that Venezuelan gang is 'taking over'
Craiglist Kpr
Powerball winning numbers for Saturday, Sept. 14. Check tickets for $152 million drawing
Northeastern Nupath
Culver's Flavor Of The Day Taylor Dr
Noaa Duluth Mn
Clare Briggs Guzman
Kentuky Fried Chicken Near Me
Jesus Revolution Showtimes Near Regal Stonecrest
Doctors of Optometry - Westchester Mall | Trusted Eye Doctors in White Plains, NY
This Is How We Roll (Remix) - Florida Georgia Line, Jason Derulo, Luke Bryan - NhacCuaTui
Progressbook Newark
Allegheny Clinic Primary Care North
Alima Becker
Mrstryst
Que Si Que Si Que No Que No Lyrics
Rvtrader Com Florida
Fridley Tsa Precheck
Royal Caribbean Luggage Tags Pending
Missouri State Highway Patrol Will Utilize Acadis to Improve Curriculum and Testing Management
What Are Digital Kitchens & How Can They Work for Foodservice
Bimar Produkte Test & Vergleich 09/2024 » GUT bis SEHR GUT
Telegram update adds quote formatting and new linking options
Collier Urgent Care Park Shore
Ludvigsen Mortuary Fremont Nebraska
Ticket To Paradise Showtimes Near Marshall 6 Theatre
Omaha Steaks Lava Cake Microwave Instructions
Kb Home The Overlook At Medio Creek
Parent Portal Pat Med
Denise Monello Obituary
Ghareeb Nawaz Texas Menu
Pike County Buy Sale And Trade
Collision Masters Fairbanks
Wgu Admissions Login
Dying Light Mother's Day Roof
Fine Taladorian Cheese Platter
All Buttons In Blox Fruits
Barber Gym Quantico Hours
Image Mate Orange County
Kidcheck Login
Vcuapi
Frank 26 Forum
Ubg98.Github.io Unblocked
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 5505

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.