A type of malicious code or program written to alter the way a computer operates
designed to spread from one computer to another and the ability to replicate themselves by hooking them to the program like songs, videos etc.
Virus
A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.
a type of malware that spreads copies of itself from computer to computer
Worms
can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
Worms
it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Worms
programmed/hacked to break into user accounts, scan the internet for contact information, to send spam, or perform other harmful acts.
Bots
can be seen as advanced form of worms
Bots
To carry out these attacks and disguise the source of the attack traffic, attackers may distribute bad bots in a botnet – i.e., a bot network.
Bots
a type of malware that is often disguised as legitimate software
Trojans
can be employed by cyber-thieves and hackers trying to gain access to users’ systems.
Trojans
once activated, it can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: Deleting data, Blocking data, Modifying data and Copying data.