🛡️

Malware Types and Prevention

Sep 2, 2025

Overview

This lecture covers various types of malware, how they operate, their methods of spreading, and best practices for prevention.

Types of Malware

  • Malware is software designed to cause harm, steal data, or disrupt computer operations.
  • Viruses require human activity to replicate and spread to other computers.
  • Worms spread automatically between systems without human intervention and are often more dangerous than viruses.
  • Ransomware encrypts your files and demands payment, usually in cryptocurrency, for a decryption key.
  • Trojan horses disguise themselves as legitimate software but secretly install malware.
  • Rootkits hide deep within the operating system, making detection and removal difficult.
  • Keyloggers record every keystroke, often capturing usernames and passwords for attackers.
  • Adware and spyware display unwanted ads and collect user data for profit.
  • Bloatware is pre-installed, unnecessary software that slows down your system but is not inherently malicious.
  • Logic bombs activate malicious actions when a specific event or time occurs.

Malware Spread and Infection Methods

  • Multiple malware types often work together to infect a system (e.g., a worm installs a backdoor for remote access).
  • Drive-by downloads can install malware without the user's knowledge just by visiting a webpage.
  • Pop-ups and email links entice users to download and run malicious executables.
  • Outdated operating systems and applications are vulnerable to new malware exploiting unpatched security holes.

Prevention and Best Practices

  • Never click suspicious links, especially those in emails or pop-ups.
  • Keep your operating system and all applications up to date with the latest security patches.
  • Removing bloatware can improve system performance and reduce potential vulnerabilities.

Key Terms & Definitions

  • Malware — malicious software designed to harm, steal data, or disrupt.
  • Virus — malware that requires human action to spread.
  • Worm — self-replicating malware that spreads without human involvement.
  • Ransomware — malware that encrypts files and demands payment for their return.
  • Trojan horse — malware hidden inside seemingly legitimate software.
  • Rootkit — malware embedded in the operating system to avoid detection.
  • Keylogger — tool that records keystrokes to steal credentials.
  • Adware/Spyware — software that displays ads or spies on user data.
  • Bloatware — unnecessary software pre-installed on devices.
  • Logic bomb — malware triggered by a specific event or time.

Action Items / Next Steps

  • Ensure your system and applications are updated regularly.
  • Avoid clicking unknown or suspicious links and pop-ups.
  • Remove unnecessary bloatware from your systems.