What is the name given to the malicious software which replicates itself and spreads between computer systems and over networks?

Malware covers malicious programs which are specifically designed to delete, block, modify, or copy data or to disrupt the performance of computers and/or computer networks. This class includes viruses, worms, Trojans, and other programs used to automatically conduct malicious activity (hacking tools, constructors which can be used to create polymorphic code etc.).

Viruses and Worms

Viruses and worms are malicious programs that self-replicate on computers or via computer networks without the user being aware; each subsequent copy of such malicious programs is also able to self-replicate.

Malicious programs which spread via networks or infect remote machines when commanded to do so by the “owner” (e.g. Backdoors) or programs that create multiple copies that are unable to self-replicate are not part of the Viruses and Worms subclass.

The main characteristic used to determine whether or not a program is classified as a separate behaviour within the Viruses and Worms subclass is how the program propagates (i.e. how the malicious program spreads copies of itself via local or network resources.)

Any program within this subclass can have additional Trojan functions.

It should also be noted that many worms use more than one method in order to spread copies via networks. The rules for classifying detected objects with multiple functions should be used to classify these types of worms.

More about Viruses and Worms >>>

Trojans

Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate.

Trojans are classified according to the type of action they perform on an infected computer.

More about Trojans >>>

Suspicious packers

Malicious programs are frequently compressed – or packed – using a variety of methods combined with file encryption in order to prevent reverse engineering of the program and to hinder analysis of program behaviour with proactive and heuristic methods. Antivirus programs detect the results of the actions of suspicious packers, i.e. packed items.

There are ways to prevent packed files from being unpacked: for example, the packer may not decipher the code fully, only to the extent that it is executed; or it may fully decrypt and launch a malicious program only on a certain day of the week.

More about Suspicious paсkers >>>

Malicious tools

Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.

More about Malicious tools >>>

Malware, short for malicious software, so it can be software that is coded with malicious code for illegal intent. This malicious code can be anything from a Virus, Worms, Trojan horse software and even Spyware. This code is malicious because it can mess up your computer or mobile devices. It can collect sensitive information without you even knowing it, it can gain access to private computer systems and even display unwanted advertising.

Types of Malware

A computer virus is basically a software program or software scripts that can adversely affect how your computer runs. These malicious viruses can create files, move files, erase files, consume your computer's memory, and cause your computer not to work right. Some viruses can replicate and attach themselves to other programs, and travel across our network. Opening an infected e-mail attachment is the most common way to get a virus.

Computer worms are a type of standalone malware program that can duplicate itself in order to jump to other computers. It uses the computer network to spread itself. Unlike a computer virus, it does not need to attach itself to an existing program. It can tunnel through your computer's memory and hard drive. If a computer worm consumes the memory you will notice your computer running very slow and it can even crash your system. If the computer worm affects your hard disk space, you will not be able to save or create new files because it will eat up your hard drive space.

Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer.

Spyware is software that "spies" on your computer. This type of malicious software can be downloaded from Web sites, email messages, instant message and more. You can even be downloading Spyware from an application when you accept an End User License Agreement from a software program. This type of software spies on your Web browsing habits, e-mail messages, usernames and passwords, and credit card information.

Email Spam is the electronic version of junk mail. It contains unwanted messages, often unwelcomed ads, to huge numbers of addresses. Spam can be a severe security concern because it can deliver Trojan horses, viruses, worms, spyware, and even directed phishing occurrences. Clicking on links in spam email may send users to phishing websites or sites that are hosting malware.

Phishing is basically online con games where malicious tech-savvy criminals attempt to steal private information. For more information, go to our page on phishing.

Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source.

A spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. There are several different types of spoofing attacks that malicious parties can use to accomplish this.

Which is a malicious program that will replicate itself and spread from computer to computer?

A worm is a malicious program that replicates itself in order to spread to other computers, often in a single network. Worms target groups of connected computers on a network. A Trojan horse is a malicious program designed to trick a user about its true intent.

What is a malicious software that rapidly replicated and spreads to any device within network?

Worms. Worms are a malicious software that rapidly replicates and spreads to any device within the network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a device via a downloaded file or a network connection before it multiplies and disperses at an exponential rate.

What is the name of malicious software?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.