Month: January 2019

What Is Malware, Definition, Explanation, and Types of Malware that You Need to Watch Out for

What is Malware? Maybe so far you have not carelessly said Malware on each occasion. But with the frequency with which he hears the word, we don’t understand malware and its explanation.

Maybe your mind is not dangerous thinking of malware, computer viruses that can attack computers or laptops. The explanation can be correct, and it can also be wrong. Therefore you will deepen again, and we will give examples for you to know what malware means.

What Is Malware?

First, you will discuss the definition of malware concerning its meaning. Malware stands for Malicious Software which is a program developed to reduce and damage the many existing computer systems. The computer or laptop that you have can save Malware via e-mail, download jobs, or can also have many approved programs.

Danger Malware is a program that can release data and information that can damage your broken computer system. Various types of malware include viruses, worms, rootkits, spyware, adware, Trojan horses, and many other types of applications that we will carry.

Not only limited to programs, but malware can also take the form of code/script. So, many programs and scripts that are suspected of being able to damage the computer system and a lot of critical information are in it.

The site itself can be infected with malware, which can happen because you can access many of the sites’ themes in random locations. Because each of the data and information that you have can be broken, even the website server can go down due to the Malware.

How Does Malware Work Like What?

After the description and definition of the definition of malware above, we will now enter to talk about the techniques of working malware to be able to damage the computer system that you have.

Malware can enter the computer system contained through various software that you have installed or can also pass data transmission from gadgets that have been exposed to the virus.

Malware that has been entered into the computer system must immediately be dealt with quickly. As a precautionary step, you can install an antivirus application that has quality and can prevent malware data from entering.

Malware Main Goals

Next, you will enter on who is targeted by this malware. Targeting malware is not a few victims, malware can be used to spy on someone, steal a lot of individual data that belongs to others, damage security programs, and still not a few more. Whatever the target of malware, this program can harm many parties infiltrated by Malware.

But in general, malware is often created with destinations destroying a software and operating system through unknown code/script. So the party that makes the malware inserts malware is hidden by the party who created it.

Malware is not the same as a virus

From the initial understanding, maybe not a few of you think that malware and viruses are the same, actually not at all.

The correct definition is that malware has meaning as a collection name which contains many risky programs for existing computer systems while viruses are part of Malware.

So with this information, hopefully, you will not be mistaken about what malware is or what viruses are.

Types of Malware You Need to Know

The explanation above, we feel that it is quite clear to explain to you what is meant by Malware. Now you will go into more in-depth reviews about the many types of malware that can damage your computer system.

# Virus

The first type of Malware is a virus that we have peeled briefly above. In a sense, the virus is a malware that has skills in manipulating data, infecting, damaging and processing existing programs.

Not only there, but a virus can also replicate itself with the technique of inserting a copy program and then becoming an element of a different program on the computer.

How the virus works and spreads through the executable file like .exe, .com, .vbs. Through this technique, the virus will be active after the user starts running a program that has been infected before. So this type of infection will not appear if the program does not run.

However, not all viruses have such work techniques. Some types of infections have more modern skills in attacking a computer. The way they will attack your computer through intermediary e-mail, USB, file sharing, and computer networks.

After the virus enters your computer system, they will nest in some points including the boot sector and document files.

There are many types of viruses that have the Macro name viruses which are a type of infection that is developed in soft devices such as various word processing software. Secondly, there is a retrovirus that can turn off the antivirus that you install on the computer. And the last one is the HLL Virus that was created with programming languages like C ++, Delphi, Basic, AND Visual Basic.

# Worm

The next type of malware is a worm. An infection is a program that can replicate itself and work on the spread of computer networks through open security holes.

Worms have characteristics that are almost the same as Viruses, and the difference lies in the virus still depends on a program while the infection does not. An epidemic is a program that stands alone and does not rely on an application such as a virus to become a nest of its spread.

Even worms can infect and damage many files in a computer system better compared with viruses. So that with this ability worms are not often associated with changes in an infection.

The workings of the worm are unique because the spread does not need any interference from other people. Infections spread by utilizing existing networks.

The way the worm will utilize the many network security loopholes revealed in the operating system. After entering the system, the devil will start working on transfer files and so much data contained in the order. Finally, the system allows worms to work on infections on a large number of data independently.

One system that has been infected then the worm will begin to spread into more extensive networks. Worms can work on infections that have many interconnected networks so that there will be fewer systems that can become infected.

If the worm has infected the network then the data you have can be stolen, access to the antivirus cannot be done, the peace feature in the system will die, the infected system will not be useful, drain the available bandwidth. Not just that, with the ability to multiply quickly, can result in computer memories running out. After that, your computer can become slow and crash.

# Trojan Horse

Furthermore, there are those that have the name of a Trojan horse or commonly called a trojan. Trojans are computer programs that can not be detected and can manipulate like an excellent program to use they are not at all. Trojans are often used to get information and control it.

The distinctive feature of Trojans is that they can be controlled through other computers, trojans can manipulate to the point that as if a program is excellent and legal, Trojans cannot replicate themselves but spread via e-mail and download files from the internet.

The way the Trojan works is by infecting the system when all users do software downloads from unreliable sources on the internet. The application has a trojan code that can allow different people to damage your computer system.

The characteristics of trojans that can disguise and appear to be good programs make not a few people deceived. Finally, after the program is run the computer that has been infected can be freely controlled by different versions of the client.

# Keylogger

Keylogger is a program that has the purpose of working on recording all activities when you reduce buttons on the keyboard.

Keyloggers can have uses depending on who will use it. For example, if properly utilized, the keylogger can monitor employee work activities, monitor student activities in learning. But if it is used for a wrong destination, a keylogger can be misused to kidnap password and PIN data that can be detrimental.

How this keylogger works is where one time the keylogger will first record all activities through the keyboard. Then the results of the recording will be saved to the list or log file.

Note that saved keylogger is very modern so that all users can understand similarly what is typed on the computer. Not only there, but the keylogger can also send recordings via the attacker’s email regularly.

The danger is that the risk of scaring the keylogger is the sophisticated encryption that a website has, all attackers can quickly collect the password.

# Adware

The next type of Malware is Adware which is an advertising application that is secretly inserted by the attacker. Adware has the skill to rotate and show ads automatically and is unknown to the user. Adware is not uncommon in the form of pop up advertisements found on a site.

# Dialer

Next is the Dialer which is a program developed to show telephone connections to the internet. Computers that have been infected by a dialer can force to connect to the internet even if they are not doing internet activities.

# Wabbit

Wabbit is a program that has characteristics similar to worms, but Wabbit does not need a connection to the network because it can work through a local network system. The danger that can be implemented Wabbit is the ability to multiply themselves to make the hard drive loaded, and the computer will become slow and hang.


BOTS is a robot that can interact with existing network services. The use of BOTS can have good and bad consequences depending on the person who developed it. If it is designed for the bad, BOTS can work like a worm that can do self-replication and then work on infections on a computer. Just contrary to the devil, BOOTS requires an order from the developer to act.

# Hijacker browser

The Hijacker browser is a malware that can replace and add benefits from the Internet Explorer browser. So that you can show certain websites when you use Internet Explorer.

# Spyware

This one malware will most disturb your privacy because Spyware can spy on computer users and then deliver information to other parties. The information contained can be observed confidentially by different people and unknown to the victim.

# Backdoor

This way of working backdoor where previously this malware entered the system and accessed so many files with the technique of violating security formalities.

Backdoor itself has two groups, one which is similar to a trojan where malware is manually entered into a program and when installed the attack begins.

The second is similar to a worm where Malware is run as a unit of the boot process.

The consequences that can occur if a Backdoor infects your computer is chaos then crossing networks and working on brute force with the aim of kidnapping the password that you have.

# Rootkit & Exploit

First explanation regarding exploits which is an application that has the skills to attack security gaps. Exploits are often used by a researcher to show that a system has a difference.

The gap found was announced for analysis to the producers to be able to be corrected or not to minimize the difference observed.

Nevertheless, exploits are often misused by a handful of people to attack the peace gap. Especially if you dealing with people money. Many of Online Gaming or Casino companies or judi bola terpercaya di Indonesia aware of this and build a robust security to secure transaction and registration member.

Then there is a Rootkit that is slightly opposite to exploit, where rootkits do not attack the system directly. Rootkits are inserted into a computer after the computer can be taken over by the attacker. The goal is so that they can erase traces of the attack.

Not infrequently the Rootkit contains a Backdoor malware, to the point that attackers can re-attack computer systems in other times.

Rootkits are difficult to detect, and you can use the following software to understand Rootkits or not. The software includes RKHunter, Rootkit Detector Kit, or ChRootkit.


Various types of Malware above can infect your computer through so many different ways. Starting from entering through the existence of a relationship in an exchange of data, passing through a computer network, entering through an exchange of storage, entering through an attachment in an email, and so on.

When malware has infected a computer, many impacts can be caused. This is mostly dependent on the type and destination of the spread of the malware. If malware attacks only the use of jokes, the impact will not be too problematic compared to malware that has the purpose of damaging a system.

If the malware has attacked so many losses, it might have happened to the attack. Such as loss of data in a computer, theft of important documentation or data, and so on.

Considering the danger of an attack carried out by malware, it makes you deserve to pay attention to every single one that can happen with caution when using your computer.