DEFINITION of 'Malware'

Malware is a software designed to allow an outside party access to a computer without the knowledge of the computer owner.

Malware is a portmanteau of “malicious” and “software”.

BREAKING DOWN 'Malware'

Malware refers to a category of software designed specifically to obtain access to a computer without the knowledge of the owner of the system. It is thus differentiated based on the intent of the creator.

Malware comes in a variety of forms, with the most well-known type called a virus. Other types of malware include Trojans, bots, spyware, and ransomware. Viruses and worms make copies of themselves and attempt to infect other computers; spyware seeks to capture and transmit sensitive information; and ransomware locks out the computer owner from the device until money in the form of Bitcoin is paid.

The most common way that malware is able to infect a computer is through file downloads. A computer user may open an email attachment thinking that it is from a trusted source, only to download a malware file instead. Malware may also be downloaded from websites if a user clicks on a link, or by sharing files with outside parties, such as through a peer-to-peer (P2P) network. The malware may be an executable file, meaning that it won’t be activated until it is opened on a computer. To increase the odds of the file being activated, malware designers may disguise the file as being something benign.

Malware is most commonly created in order to make money. One way this is done is by stealing information found on a computer, such as credit card information or other sensitive or confidential material. The malware creators may also ransom the information stolen by demanding payment in exchange for not making the information public, or, if the software takes control of a computer, for returning access to the owner. Malware creators may sell the information to third-parties rather than try to collect money from the owners of infected computers directly.

The rise in the number of devices relying on software – from cell phones and computers, to cars and televisions – has increased the threat posed by malware. The emergence of the “internet of things”, in which computerized devices including everyday objects, are connected to the internet, means that outside parties can use malware to gain access to sensitive information by first attacking the weakest link in the security chain. Devices that were once not computerized, such as refrigerators, are turned into smart devices by connecting them to the internet, but with software not designed with security in mind.

Protecting computers from malware is a multibillion-dollar industry. Individuals and businesses seeking protection from malware can purchase software that blocks known threats. Corporate information technology (IT) departments may limit the computer administrative rights of employees, making it more difficult for them to accidentally download programs that may be harmful. While protective software can help reduce threats, educating employees on how to recognize ways that malware may infect a computer is also important. For example, educating employees on how to recognize potentially harmful website links or suspicious download files from unknown email senders can reduce the threat of malware.

 

 

 

RELATED TERMS
  1. Data Loss

    Data loss occurs when valuable and/or sensitive information on ...
  2. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software ...
  3. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, ...
  4. Banker Trojan

    A malicious computer program designed to gain access to confidential ...
  5. Cloud Computing

    Cloud computing is a model for delivering information technology ...
  6. RAM Scraping Attack

    A type of electronic fraud in which malware is installed at a ...
Related Articles
  1. Tech

    Bank Hackers Target Smartphones

    Now that you can bank by smartphone, hackers can also get into your account that way. How to protect yourself.
  2. Tech

    What is Illicit Cryptomining?

    Illicit cryptomining is when malicious parties try to surreptitiously mine for cryptocurrency using others' computing power.
  3. Investing

    Microsoft Word Target of Zero-Day Malware Attack

    Microsoft's Word has a new vulnerability that can enable hackers to secretly install malware.
  4. Tech

    SWIFT Attacks: Hackers Strike Again

    The recent SWIFT cyberattack has revealed connections to the earlier Bangladesh and Sony attacks.
  5. Investing

    Microsoft Turns to AI to Fight Cyberattacks

    Microsoft is turning to artificial intelligence in the wake of the WannaCry ransomware attacks.
  6. Tech

    What is Botnet Mining?

    Beyond the standard mining process, botnet mining is another profitable, yet illicit, way to earn cryptocurrencies
  7. Investing

    Android Phones Vulnerable to Wi-Fi Attacks: Report

    Cybersecurity experts say a new kind of attack lets hackers read Wi-Fi traffic, inject malware.
  8. Insights

    The Industry Handbook: Software Industry

    Discover how the software industry has changed throughout the years to become a mainstay for businesses from programming to software as a service.
  9. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
  10. Investing

    Intel Chip Flaw Lets Hackers Access Windows Devices Remotely

    Intel disclosed a new security flaw that enables hackers to access Windows PCs, servers and laptops remotely without the need for a password.
RELATED FAQS
  1. Who are Apple's main competitors in tech?

    Explore Apple's competitive position in the many industries in which it operates. Learn about the different products and ... Read Answer >>
  2. What is the best software for calculating the cash budget of an individual?

    Explore the options and features of several leading personal finance tools to find the best software for calculating your ... Read Answer >>
  3. What should I look for when choosing a forex trading platform?

    A trading platform is a piece of software that acts as a conduit for information between a trader and a broker. A trading ... Read Answer >>
  4. What are some examples of ways that sensitivity analysis can be used?

    Understand the concept of sensitivity analysis and learn about the wide variety of disciplines to which it can be applied. Read Answer >>
Hot Definitions
  1. Market Capitalization

    Market Capitalization is the total dollar market value of all of a company's outstanding shares.
  2. Capital Asset Pricing Model - CAPM

    Capital Asset Pricing Model (CAPM) is a model that describes the relationship between risk and expected return and that is ...
  3. Return On Equity - ROE

    The profitability returned in direct relation to shareholders' investments is called the return on equity.
  4. Working Capital

    Working capital, also known as net working capital is a measure of a company's liquidity and operational efficiency.
  5. Bond

    A bond is a fixed income investment in which an investor loans money to an entity (corporate or governmental) that borrows ...
  6. Compound Annual Growth Rate - CAGR

    The Compound Annual Growth Rate (CAGR) is the mean annual growth rate of an investment over a specified period of time longer ...
Trading Center