Rootkit

A rootkit is malicious malware designed to remotely access or control a computer without being detected by users or security software programs. Using rootkits, cybercriminals can execute files,steal information, modify configurations, alter software, or even install more malware. Rootkits can be included in software applications and can enter a computer through phishing attacks or through a security vulnerability. A rootkit is very difficult to remove, so prevention is key.

Keylogger

Keylogger malware is a dangerous threat to a PC user’s privacy. It will track your keystrokes and save them in a hidden file on your computer. After a certain amount of time, the file is sent to the hacker automatically, who will use the keystroke data to get your passwords or personal and business information. Keyloggers often enter computer systems as trojans, disguised as a free or useful app or download,and can install itself when users are clicking and browsing the Internet or downloading software.

Worms

Worms are a type of malware that uses a computer network to replicate itself and spread. They are self-replicating and unlike viruses,do not need human action to quickly spread through your computer, or even an entire network.Worms often gain entry to a computer through a security vulnerability or weakness.

Trojans

Trojans behave like a Trojan horse in Greek mythology. The soldiers hid inside of the horse to penetrate the city wall of Troy and waited until nightfall to attack. A Trojan works in a similar way. It disguises itself as a trusted software program or application to get into your system and attack later. Trojans offer disguise themselves as a computer game download from a hijacked website.

Ransomware

Ransomware locks your files and demands you pay a ransom to unlock and access them again. This type of malware is rapidly becoming more advanced. It can immediately start deleting files as soon as you are infected, pressuring you to pay up. One of the most common ways that ransomware can access your computer is through phishing. Phishing uses email as a weapon, disguising itself as a legitimate email and tricking the user into opening the email or attachment.