Difference Between Virus, Trojan & Worms

In this entry, ITSC will bring you all the differences between Virus, Trojan and Worms. Of all the threats mentioned we can categorized them as Malware. In the IT security field, Malware is actually a short term for malicious software, where this Malware is a malicious software that will bring threat to the victim in terms of computer security and internet security. Apart from those three, there are also other types of threat that will be discussed as well.

Virus is a pretty direct-attack software. Basically, what a Virus will do on an infected PC or machine is that it will continue to spread from files to files and also possible from machine to machine. I call Virus as a direct type of attack as its job is to destroy data regardless of the importance of the data. Usually, a person will send a virus to another person if he/she really hates the other person and what the sender hope is to see ultimate destructions. Virus basically will only destroy data in your computer which might also end up corrupting the entire OS.

If you ask me, among the three, which threat I fear the most, I would say Trojan. Trojan Horse or also known as Backdoor is quite a tame threat. Sometimes, anti-virus might also hard to detect its¬†existence. This is because Trojan can be as smart as it will only be activated when it detect some special movement. Movement such as the victim attempt to browse an internet banking website. This is because the purpose of a Trojan is to sneak into a PC and gathers information and also manipulate communication if necessary. Thus, instead of computer data in danger state for a Virus attack, now the victim’s privacy such as bank account information is at danger state now. To learn more about how a Trojan being apply in a real world situation, kindly refer to here.

Worms attack can be not so threatening. Worms style of attack is to replicate themselves from time to time. This means that if you are infected with worms, you might see unknown folders or files duplicated in your system, or even sometimes address books or email is duplicated. In short, I would say that Worms attack is to irritate the victim. You can’t say it is not threatening because nobody will feel comfortable being attacked. Sometimes Worms can be removed easily, but sometimes, you need to find the source where it start replicating the item. It can take a very long time to find the source but in the mean time, it can be prevented by deleting the replicated items.

Spyware is a type of threat that steals user personal and private information from the computer. A spyware does not manipulate a connection channel like Trojan, but just information gathering. Besides getting your information stolen, sometimes, it is also irritating when a lot of spywares are trying to get your information until your entire Operating System have to run in a very slow manner. Spyware however can be scanned and removed properly.

Have you ever downloaded a free virus scanning program that tells you that you had a lot of viruses in your computer? Well, they call it a Scareware. It scare the hell out of you by telling you the information that will scare you off. It will then offer you the solution by purchasing their product so that you can get those threat removed from your computer. Trust only the popular anti virus around. Scareware is just to scare you and trick you into buying their product.

How to combat Malware?
Always when dealing with this kind of threat, it is always important to stay careful. ITSC would like to give some words of advice as the end of the entry
  • Never open any email attachment that you can’t trust.
  • Never click on any URLs that you don’t know (especially messenger).
  • Never trust the person that you don’t know.
  • Never run any untrusted program regardless of .exe or even .pdf.
  • Always update your anti-virus definition and OS patches.
  • Regularly perform a full system scan.
  • Never rely too much on anti-virus. Some Malware can be too new to be in the anti-virus definition list.

Build Your Own Security
Subscribe to my newsletter and get a copy of my eBook for free.
We hate spam just as much as you

Related posts:

  1. Boy In The Browser
  2. Man In The Browser
  3. Tatanga, Trojan That Robs Bank Account
About Alan Tay

This blog is owned and operated by myMediaInc. My Media operates content based online portals for IT professionals, technology managers and decision makers as well as business leaders. We publish original quality content focused in Software Development, IT Security, SaaS, Cloud Computing, Outsourcing, Project Management and Mobile and Wireless. Our mission is to explore how to help you optimize your resources in each of these areas.

Find us here IT Security Column.

Speak Your Mind


CommentLuv badge

This blog uses premium CommentLuv which allows you to put your keywords with your name if you have had 3 approved comments. Use your real name and then @ your keywords (maximum of 3)