What is Malware?

Malware is malicious and intrusive software that aims to damage or disrupt a computer system. There are several types of malware that you should be aware of, including but not limited to, spyware, scamware, scareware, viruses, Trojan horses, backdoor and adware.

Spyware

Spyware is software that covertly transmits personal or organizational data, such as internet activity, from your computer without your knowledge.

Scamware

Scamware is malware that poses as legitimate software. Undetectable by antirust and anti-malware, scamware is used to collect personal data, steal money and infiltrate identities.

Scareware

Scareware uses deceptive practices to generate fear and panic in order to trick web users into downloading and purchasing malicious software.

Virus

A virus or worm is a self-reproducing piece of software that can replicate copies of itself into computer programs, data files, documents and the boot sector of the hard drive without the user’s knowledge.

Trojan Horses

A Trojan horse is a program that disguises itself as legitimate software, but is actually malware designed to allow unauthorized, remote access to the victim’s computer. Unlike viruses, Trojan horses do not have the ability to replicate themselves.

Backdoor

A backdoor virus is a program that bypasses normal authentication to secretly enter a computer system and allow a third party to control the computer.

Adware

Adware is advertising-supported software that automatically downloads or displays unwanted advertisements in order to generate revenue. Adware can also collect marketing data and other user details without his or her knowledge.

What Should You Do?

Because malicious software can easily go undetected, it is worthwhile to utilize a monitoring service to protect your website and email server from these is harmful threats. Uptime.com, for example, is a website monitoring service that scans for malicious software and other security threats 24 hours per day, 7 days a week.  You should also be cautious of downloading new files to your computer. Research any files that look “sketchy” prior to opening them, and always remember – if it’s too good to be true, it probably is.

Minute-by-minute Uptime checks.
Start your 14-day free trial with no credit card required at Uptime.com.

Get Started

Catch up on the rest of your uptime monitoring news