Malware
By combining the words malicious (meaning harmful) and software, we get the word 'malwareSoftware that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details.'. Viruses are just one type of malware. Other types include spyware, wormStandalone computer malware that replicates itself to spread to other computers and trojanMalware that appears legitimate, but performs some malicious activity when it is run..
Virus
A virus is a program designed to disrupt a system by gaining access to your device. It can copy your personal data, delete your files or slow your device down. A virus spreads by duplicating and attaching itself to other files.
Spyware
Spyware is software that allows a user to obtain information about another's computer activities by stealth. It installs software and transmits information such as browsing habits secretly to a third party.
Phishing
phishingAn attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details. is the act of trying to obtain financial or other confidential records such as passwords from internet users. Emails that look like they are from a legitimate, respected organisation are sent, but they contain links to fake websites that 'phish' data from unsuspecting victims.
Trojan
In computing, Trojan refers to any malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games.
Worm
A worm is a computer program that makes lots of copies of itself, like a virus. The main difference between the two is that a virus attaches itself to another computer program, but a worm works by itself. As well as copying itself, it can be made to do all sorts of things, like delete files or send emails to everyone in a user's address book.
Keylogging software
Keylogging software is designed to record and store every keystroke made on your computer. Criminals often attempt to install keylogging software onto your computer remotely. A keylogger is often used to steal passwords and personal data without the person knowing it's happening.
A keylogger can be combined with a communication program so that each keystroke is sent to a remote computer over the internet when the target computer is online.