Further classifications of malware

There are many different types of malware, all with different modes of operation and objectives. Some damage is just annoying - others can have serious financial consequences. It is not uncommon for Malware to have multiple functions or ways to gain access to your computer. But all Malware has one goal: to harm the user.

Adware - Stressful and annoying

Adware, often also called Bloatware, are installed in the background on the PC and redirect the user to advertising sites. Often it is also responsible for annoying pop-ups and advertisements that open constantly and unsolicited. Bloatware also includes programs or applications that are installed together with software that is actually desired. In general, adware is one of the more harmless threats on the Internet, but the unwanted advertising pages can redirect to more insecure sites, which then install worse malware. For this reason, adware should also be uninstalled immediately after detection. You can prevent bloatware from being installed yourself by always taking care not to install an additional program when setting up new software.

Keylogger - every keystroke is recorded

Keylogging actually has its origins in legitimate surveillance in the IT sector. There, it is installed either as software or as hardware and reliably records every keystroke. In the malware area, a keylogger always appears as software, which installs itself undetected in the background and then records every input via the keyboard. These entries are then forwarded to the "sender" of the malware, and this is where the danger lies: every password entered, financial data, credit card numbers and PINs are now in the hands of the sender. It is easy for him to use the email account, online banking or other confidential data for criminal purposes. Keyloggers are among the most dangerous malware because they can potentially cause a lot of damage and may also be difficult to detect. It can disguise itself as an ordinary file, possibly rebuilding itself and independent install and rarely causes problems with the PC, such as jerking or a slow system.

Scareware

Scareware, as the name suggests, tries to scare or frighten the user. This is done by a suddenly appearing pop-up or advertising window that reports an alleged PC problem. These warnings range from an alleged infection with a virus to problems with the operating system or missing important program components. The warning is intended to scare the user into either purchasing software to supposedly fix the problem or downloading a helpful program. This software then often contains malware; when purchasing software, users often disclose sensitive data about themselves. Scareware can be delivered either through pop-ups, pages or even via email. Spam can be distributed.

 width=

Spyware

Spyware, spies on your own computer in such a way that the fraudster has various possibilities to use it for criminal purposes. Spyware can disguise itself as a browser bar or change the user's home page. These are then used to record and analyse the user's behaviour on the WorldWideWeb. Sometimes spyware can cripple certain functions of the computer, for example, withdraw administrator rights or create security holes in your own system, which then acts as a gateway for further malware.

Phishing

Phishing refers to the "fishing" of sensitive data, such as bank data or credit card information. The dangerous thing about phishing is that your own computer does not have to be infected - the user may just not pay enough attention. Phishing directs the user to the wrong page, where he or she enters data without suspecting it. This could be passwords or financial data. Phishing usually starts from the user's own e-mail account. The user receives a fake e-mail from a well-known company or his bank, asking him to log in again or confirm certain data. When clicking on the link, the user is redirected to a fake site and when entering the data, the user passes it on to the fraudsters.

Ransomware

Ransom, in English the ransom, asks the user to pay a "ransom" after an infection of the computer, so that the own PC works again. The scammers "block" the computer with malware, then pop up a big warning notice and ask the user to pay a certain amount to get the computer working again.

Current articles