Malware is malicious software developed for the sole purpose of circumventing the normal operation of a computer system. Cybercriminals use it for various purposes including stealing data. Also called malware or malicious software, these programs exist in considerable quantity. Apart from companies, your personal computers are also the target of these malicious weapons. In this dossier, we offer you an overview of the different categories of malware to which you may be exposed.

Here are the different categories of malware

computer virus

A computer virus is defined as a piece of code that integrates into a completely legitimate application. The computer virus has the particularity of replicating and spreading to other computers exponentially. The triggering of this malware depends on the action of the user. Thus, when the latter downloads an attachment, or opens an e-mail, or runs an application containing a virus payload, the triggering takes place automatically.

The computer worm

This type of malware aims to infect a large number of computer systems. Unlike viruses, worms can self-execute. In other words, they can do without user action to function. How is it possible ? Simply because this malware exploits vulnerabilities in the software they attack. The “ I love You ” worm   is arguably the most famous malware. It was known for its lightning speed of spread of around 50 million infected computers within 10 days.

The Trojan horse

A Trojan Horse (or Trojan Horse) is malicious software that comes in the form of legitimate software. Therefore, users download and make use of it without suspecting the real intentions of this program. Indeed, this malware once operational on your system performs unauthorized tasks. It could be stealing personal data, or tracking your activities.

See also  Discover Doodle Icons: a library of 400 hand-drawn icons


Ransomware tops the list of malware most used by cybercriminals. Its first appearance dates back to 2012. Ransomware’s mode of action is very simple. First, the program installs itself on the victim’s computer. This encrypts the data on the computer. In other words, the victim finds himself unable to access his own data.

To remedy this, he needs a decryption key. Unfortunately, this key does not fall from the sky. The victim is forced to pay a ransom to the hacker to regain access to his files. Hence the name ransomware, ransomware or ransomware.

Spyware and adware

Also called spyware or espionage, spyware is programs installed on a computer without the user’s knowledge. This malware steals system information. These can contain the history of all the activities of the victim on his computer. Passwords, browsing history, messages, payment data, etc. everything went through a magnifying glass.

Unlike spyware, adware injects advertisements into a system. This software, even if malicious, does not present a very great threat. They generally use web browsers to achieve their ends.


Keyloggers or keyloggers are a category of spyware present on the market. Hackers use it to record all keystrokes typed by the infected user. Thus, they can collect a lot of personal information. Keyloggers can also be used by parents who want to monitor their children’s activities. For business leaders, this program is a great ally to keep an eye on the online activity of their employees.

If you liked this article, please subscribe to our reddit community to discuss it. You can also find us on Twitter and Facebook.

5/5 - (1 vote)

Tagged in:


About the Author

SAKHRI Mohamed

Founder & Editor

Passionate about the web, new technologies and IT, I share on tutorials, tips, advice, online tools and software for Windows, Mac and Linux. I'm the founder of this blog and I'm very interested in anything to do with technology, but I also love playing games. I was born in Constantine, but now I live in Algiers/Algeria

View All Articles