Adware
Adware is the malware that creates multiple annoying pop up ads on the device’s screen especially in web browsers. This malware is either disguised as legitimate software or is linked to another software in order to trick the user into downloading it.
Spyware
Spyware is used when a person has the intention of tracking what the user is doing on their device. This type of malware logs websites visited, sometimes keystrokes and may even tap into webcams all while reporting back to the person who created the spyware.
Virus
Similar to a biological virus, these types of malware infect a computer and when ran unnoticeably by the device’s user, copies itself by changing other softwares on the device and then attempts to spread itself to other devices on the same network.
Worms
Worms are almost identical to viruses, the difference is that with viruses the device’s user has to be the one to execute the software stored within the malware. With worms, the software can replicate and infect other devices on its own, meaning the device’s user is less likely to understand what’s happening and how it happened.
Trojan
Trojan malware could be considered the most dangerous form of malware due to its sneaky technique. Trojan malware disguises itself as legit software or helpful tools to entice the user to download it. In doing so, the trojan malware can then hijack the device and access any personal information and unauthorized areas of the device.
Ransomware
Ransomware is known as the cybercriminal’s go to tool for easy financial gain. Ransomware is the malware that will lock your device and or encrypt files on the device so that only the ransomware’s author has the keys to unlock them. In doing so, the author will typically exchange the keys for money, usually in bitcoin because those types of transactions are difficult to trace. The targets of ransomware are typically big, well off companies who have a great sum of personal information from customers, making it very difficult for the company to refuse the ransome.
Rootkit
Rootkit is the malware used to gain access straight to the administrative permissions on a device, hence the “root” in the name. It attacks directly the main part of the device that controls everything. This form of malware is also intended to hide itself from other softwares on the device, the device's user and even the device’s operating system in order to remain undetected.
Keylogger
Keylogging malware is the software that malicious people use to track a user’s keystrokes. This means anything that is being typed into the computer is being reported back to its author. The intention with this malware is to gain sensitive information such as usernames and passwords, debit or credit card information, addresses, etc.
Malicious Cryptomining
Also known as drive-by mining or cyptojacking, malicious cryptomining is when a software is undetectably installed to a user’s device with the intention of mining bitcoin. The software then takes this bitcoin and deposits it into their own account rather than the device’s user’s account.
Exploits
Exploits are the form of malware that only seek the bugs and vulnerabilities in a device to gain control of the device. In doing so, the attacker can gain sensitive information or install other forms of malware to the user’s device.