Well, you must be familiar with terms like: Virus, Spyware, Trojan, Worm, Rootkit, Malware, Ransomware .. and right?
I know many of you still think that they are all 1, just different in calling. However, if you dig deeper, you will see, they are much different.
It is not natural that people come up with dozens of different names for such classification, but each type will have a different way of working.
So what’s the difference between Virus, Spyware, Trojan, Worm, Rookit, Malware, Ransomware..?
#first. Spyware and Malware
+) Spyware (Spyware), this is a form of software that somehow gets installed on your computer.
This software will silently collect personal data about your activities on your computer, phone… (eg personal information, online accounts, information you enter from the keyboard)… and send it to you. about the hacker’s server.
The term Spyware used to be very popular in the past, but Spyware is now much more advanced than it used to be, it doesn’t simply collect data anymore, but attacks computers and does much worse things than that.
So the term Malware was replaced and for Spyware.
+) Malware (Malware). Just hearing the name, you can already imagine what it is, right?
Yes, any software that harms a computer is collectively known as Malware (its purpose is to collect data, steal information, extort money, attack computers, encrypt data… in short. is to make illegal money from what it collects).
Malware Malware is the common name of Viruses, Trojans, Worms, Rookies, Ransomware…
#2. Virus
Talking about viruses, it is probably the most well-known, and all malware in general, people often refer to one term, read it as a virus.
But in reality..
A virus is a program that has the ability to spread from one computer to another.
It is usually in the form of an executable file (*.exe) !
Viruses are usually “attached” to a certain piece of software (usually found in cracked software), and when you run these software, the virus will begin to spread and spread to other files/folders on your computer. computer.
Usually, it takes a user’s action for the virus to spread and spread, for example when you download the “temple” software and install it on your computer, or you click on the links in the website. Spam email, download email attachments and run it….
In short, when the user runs the file “with a virus attached”, the virus can infect the computer.
This also means that the virus can exist in the system and do no harm to the computer / phone when the user has not opened it.
#3. Trojan
Trojans are often disguised as legitimate software for users to actively download and install it.
Trojans not only steal computer data but also allow hackers to infiltrate the system, control the system …
To better understand Trojans, read this article: What is Trojan Malware? How to prevent Trojan effectively
#4. Worm
Worm, also known as computer worm. Worm is similar to a virus but it is on a different “level”, much more dangerous than a virus.
Worm can self-replicate and reproduce itself. If the virus needs a file to attack and infect, the Worm is an independent program that does not need any files or user influence, but it can still spread.
Just one computer in LAN Worm is infected, the whole system will be at risk of being infected with this type of malicious code.
When infected with Worm, the computer network will be slowed down (the number of accesses increases due to worms), some more dangerous types will delete files, automatically send Email …
Worm is mainly spread through security holes on computers and software. So you need to update them regularly to keep your data safe.
#5. Rootkit
Rootkit is quite smart when it knows how to hide from the antivirus software.
Rootkits are often used by hackers after gaining access to a computer system.
This also means that Rootkits are often combined with malicious software such as Worm, Virus or Trojan … to hide their existence from users.
There are many different types of Rootkits and they also work in different ways. Once the computer is infected with a Rootkit, the hacker will have control of your computer, the rootkit also has the ability to remotely run files and change the computer system configuration…
#6. Ransomware
Ransomware is a very popular ransomware in 2017 and has constantly had more dangerous variants in recent years.
This type of malware will attack the computer, then encrypt the data, take control of the computer and ask the user to pay to get the data back.
Yes, I’ve heard that this software is very old, isn’t it >.<
#7. Epilogue
Through this article, you already know the difference between Virus, Spyware, Trojan, Worm, Rootkit, .. right?
According to statistics, more than 97% of computers and phones are infected with malware due to user factors, only 3% of the remaining causes are due to software / operating system factors (outdated / hacker declares). exploit vulnerabilities).
Therefore, raising awareness when using computers and the Internet is still the most important. Security software is only one part, what matters is how you use it!
Kien Nguyen – Blogchiasekienthuc.com
Note: Was this article helpful to you? Don’t forget to rate the article, like and share it with your friends and family!