The difference between Virus, Adware, Spyware and other Malware

Articles

Today, our Personal Computers are more protected than ever because many programs detect and eliminate threats that want to access our computers. Nevertheless, we can not say that Personal Computers are more secure than a few decades ago.

Undoubtedly, the computers with Windows Operating Systems installed on them are most at risk because most threats have as their objective Microsoft's Operating Systems. Due to this situation, many Viruses, Spyware, and Malware detection and elimination tools are developed.

It is important to know how to differentiate what action is performed by each type of threat since antivirus may detect a threat in a harmless file that does not detect other types of files, which can cause discomfort to the end-user.

The programs that have malicious intentions are known as Malware. So the following programs are classified as Malware (Malicious Software).

Virus

A Virus is a program, library, or code that spreads itself and infects other files. The intention of the virus is usually harmful: delete computer files, infect and corrupt files, or damage the operating system's file structure. Viruses have decreased over the years, as they tend to be detected quickly by antivirus engines.

Worms

As the Virus, the worms spread all over the hard disk. Their intention is not to damage or delete files but to spread themselves as much as possible. This reduces the hard disk space available and high CPU consumption, which transformed into a slower Operating System. Worms can be spread to other computers on the network, searching for and taking advantage of known vulnerabilities in Operating Systems.

Trojans

This file/program is installed on the computer with the “form” of a normal program. That is to say; Trojans come hidden in programs that perform a specific function. For example, we can download a program that serves to exchange files, and this program, in addition, to downloading the files, can execute harmful actions hidden and transparent to the user. Unlike viruses, Trojans do not spread themselves to other files, but it is usual to find them on the Internet hidden on some Installers. A Trojan can control the computer remotely by another user, so despite not being destructive, it's a threat to the privacy of the user whose PC is infected with a Trojan.

Rootkits

This type of software hides its presence in the Operating system and the user in such a way that despite being installed and working, it will be ignored by the OS and can perform any malicious action. This type of threat was difficult to detect for some time, but currently, the vast majority of Anti-Virus can detect and remove this type of Malware.

Ransomware

This type of Malware goes a step further than the earlier, blocking the infected computer so that the user may not be able to use the keyboard or the mouse. Once the computer has been blocked, the Malware will show a message requesting the payment of money to unlock the computer. We will not make any payment because it will not unlock the computer. The only way to unlock the PC is by deleting and removing the Ransomware.

Adware

This type of Software displays advertisements in the form of pop-ups or inserts ads on the web pages we browse. This type of Malware becomes very irritating since it makes it impossible to browse without interruption and use the computer to show countless pop-up windows.

Spyware

These programs collect information about the habits of use of the PC and typically use these data for commercial purposes. It can collect information about the sites visited and gather information about the user and the computer.

Adware and Spyware are classified as PUPs(Potentially Unwanted Programs) McAfee. This new definition arises due to the complaints of some Software developers, who allege that during the installation of their Software, the conditions of use inform the end-user that the program will collect private information. To carry out the software's installation, the end-user must accept these terms of use so that software developers obtain the user's consent to collect private information.

PUPs differ from other Malware. Viruses, Trojans, Worms, etc., are usually programs the end-user doesn't want on his PC. However, PUPs can be programs the end-user wants to use on his computer. For example, a user may want to have installed a file-sharing software, which, in a transparent way to the user, gathers information from his computer. That is why it is called Potentially Unwanted Programs (PUPs) because although the end-user will use that program for one particular function, the software brings several undesired “additional functions.”

These last two types of Malware (Adware and Spyware) are the most spread Malware through the Internet and the most common cause of trouble to the end-user (and more benefits brought to a multitude of stakeholders). This is because they can pass as harmless applications, so it is easier to distribute them over the Internet.PUPs tend to be distributed through installers of other programs. That is to say, when we install a legitimate program, Adware or Spyware will be installed along with the main software. This type of installer is very common in a multitude of download pages. In Usitility, we do not use these installers and scan our downloads in search of this type of program. You can look for more information about the process we follow to detect this type of program here.

Now that we know different types of Malware, it is convenient to know the False Positives. When an Antivirus software scans a file, the file may be detected as a threat when the file does not represent any danger to the user. This is called False Positive. For example, the next tool, John the Ripper, which serves to decrypt passwords, will be marked as a threat by multiple Antivirus engines. This is because many Antivirus determine that this tool can be used with bad intentions and harm third parties. That is why we must learn to interpret the results of the Antivirus.

That said, we can only recommend you to download a good Antivirus and a good Antispyware, and make all your downloads from a trusted site such as Usitility.