A computer worm is a standalone malware program & same like a virus but it is a sub-type of virus. It copies itself from system to system but it has the capability to spread without any human action. Email worms are inclined to send their self to every email address, it finds on the infected PC.
Trojan horse is a nasty computer program which might appear harmless but enable the hacker to get into your system & steal sensitive information. Trojans can be employed by cyber-thieves & black-hat hackers trying to gain access to users’ systems.
This malware displays unwanted advertisements, mostly in the form of pop-ups & collect marketing type data about you – such as the types of websites that you visit – so that customized adverts can be displayed.
Spam may be defined as unwanted emails. It is flooded with several replicas of the same message, for people who would not otherwise choose to accept it. Though spam is not a straight threat, it can be employ to drive different kinds of malware.
Phishing has attempted to get the personal information such as passwords & credit card details. This is done by sending official looking emails as a look of trustworthy sender. Users of online banking & auction websites are most expected to become a target.
It is a more complicated form of phishing. Pharmers can create a fake site that looks like a genuine site, for example online bank page & redirect the traffic to that fake website & then gather the information users think it’s a real bank page.
It is designed to record the user’s each & every keystroke that you used to create an email, message & any information that you type with the keyboard. Keylogging allows thieves to get the particular information that can be used for intellectual property theft.
Rogue security software
Rogue security software is a kind of online con that misleads users into considering there is a virus on their computer, & also manipulates them into paying for false malware elimination. Mostly it pretends as an antivirus & antispyware program.