Malware

Since the beginning of the world wide web, malicious software has frequently been used by governments, businesses, and illegal hackers as a means to secretly collect personal data such as passwords, card numbers, web browsing data, and to gain access to other information that can breach a user’s identity and be used for profit. Malware is a broad term used to describe software that is intended to harm computer systems. Things such as viruses, spyware, adware, and trojan horses all fall under the term Malware, since these are intended to do harm to the user and their computer. Malware can be contracted onto a computer in several ways, such as downloading a deceiving program, visiting the wrong webpage, or accessing an unprotected network.

Types of Malware

 * Computer Viruses are programs that are meant to replicate it's code into programs on a user's computer, to "infecting" a host computer. There are different mechanisms to infect a computer, along with reasons why viruses can be profitable for the person responsible for the virus.
 * Trojans Horses are a type of Malware that infects a users computer with a misleading link, or download. Examples would be a link that gains the user's attention, but infects it with malicious software once clicked.
 * Internet Worms are malicious attacks usually spread by and aimed at networks. These attacks are meant to disrupt and harm networks, instead of releasing a payload to gain personal information as a virus would.
 * Backdoors are used to gain access to a system by bypassing normal authentication processes. Usually these are downloaded through some kind of trojan, worm, or virus, and can be used to compromise networks and accounts alike.
 * Spyware is a type of malware that tracks and stores the user's internet movements through the use of keyloggers, and remains undetectable through rootkits. Spyware can have different uses, such as a software simply tracking it's users movements, finding personal bank information, or threatening a user with the release of personal information unless a ransom is paid, otherwise known as ransomware.
 * Rootkit are used to control or gain access to a computer while remaining undetected. Once installed, a rootkit gives the person behind it to execute files, access information, and change settings on a user's computer.

Dangers
Most types of Malware will hold a payload, which is the part of the software that does the malicious actions. As touched upon above, malware can have a variety of actions, such as getting hold of personal information such as account credentials, bank cards, and other personal data. Malware can also disrupt networks or cause harm to hardware on the infected user's computer.

Countering Malware
To counter malware, there are antivirus softwares which users can download to protect themselves from malware. Anti-Malware programs can scan a user's network for malicious content and block them as they try to breach the user’s computer. There are other types of anti-malware software that can scan the contents of the operating system files, and detect malware already existing on a user’s computer. More information can be found on the Cyber Security Wikia.