Malware 101: What You Need to Know

Malware is malicious independent programs that disguise themselves as helpful, such as a screensaver or build themselves into free downloads.

When this malware is loaded onto a computer system, it can capture information from the system, such as usernames and passwords.

Access to usernames and passwords will allow hackers or crackers to control the computer system remotely.

Table of Contents

Type of Malware

Malware can cause significant damage to privacy and security. There are three (3) types of malware.

  1. Computer Worm
  2. Logic Bombs
  3. Trojan Horse

1) Computer Worm

Malware - Computer Worm

Computer Worms do not have to attach themselves to a computer program. Still, they are independent programs that replicate themselves by spending copies of files on other computers in the network.

The network infected by the computer worm is damaged, as a lot of bandwidth is used to send millions of messages in the form of spam emails.

Computer worms usually affect the computer’s memory and cause the system to be unresponsive.

2) Logic Bombs

Malware - Logic Bomb

Logic bomb malware remains hidden in the central computer system and will only be activated at some point.

The logic bombs will only be activated when users begin to use the program.

Then they begin destroying data in the computer system.

3) Trojan Horse

Malware - Trojan Horse

Trojan horse, another type of malware, impersonates itself as an independent and legitimate software program.

The Trojan horse then attaches itself to the computer system.

Once triggered by a pre-set event or date in the computer system, it destroys files or disks.


Malware is a dangerous and malicious program disguised as helpful software or downloads.

Once it infects a computer system, it can capture sensitive information such as usernames and passwords, allowing hackers to take control of the system remotely.

There are three main types of malware, including.

  • computer worms – that replicate themselves and cause network damage

  • logic bombs – that remain hidden and destroy data at a later time

  • Trojan horses – are programs that impersonate legitimate software and destroy files or disks.

It is crucial to protect against malware to ensure privacy and security.

Anyway, take your chance to enhance your knowledge and skills in Computer Science by participating in the Beaver Computational Thinking 2023; registration is now open!

You can register through our website 👉 CONTESTHUB.

Related Posts

Hi, how can I help you?