• Security
  • 17/10/2020
"So much malware, what do I do?"

Malware is the common term covering all malicous programs written with the intent of obtaining data and corrupting a system.

Below is a list of the different variants you need to be aware of:

Macro viruses 

Written in macro language such as VBS (Visual Basic Scripting). Macro Viruses are usually platform independent since many apps allow macro programs to be embedded in documents. Programs may run automatically once a document is opened (word, excel), then the VBS scripts will begin to make their way into your system.

Stealth Viruses

A computer virus whichy stealthily hides its modifications. It tries to trick antivirus software by intercepting its request to the OS and provide false information.

Polymorphic viruses

This type of virus produces a variety of altered operational copies of itself. It is possible for there to be no identical parts between two different infected copies. This makes it very difficult to detect directly using signatures and anti-virus software.

Self-garbling viruses

Attempts to hide antivirus software by modifying its code to not match pre-defined antivirus signatures.

Bots & Zombie

Collection of hacked devices under commanded control of a hacker. Compromised machines may be part of a bot network or a zombie.


A virus that spreads from one machine to another on a network.

Root Kits

The worst software based malware. Usually embedded into the kernel of the ODS therefore can conceal itself completely from the OS.

Firmware Rootkits 

The Worst of the worst. Within your hard drives firmware chip, you may have some malware. Formatting your drive and re-installing the OS will not shift it. This type of malware is NSA, GCHQ standard. However, podcasts and papers have been produced on how to counter it. IT Specialists of note may have taken the time to learn how to remove it.

Key Loggers

Logs your key strokes and what you type into your browser.

Trojan Horses 

Appear to be one thing but are in fact malware. If you download a piece of software, a trojan acts as the software but has malware attached.

Remote Access Tool (RAT) 

Malicious programs that run on your system allowing intruders to access your systems remotely. Similar to remote admin tools but hackers are using them. These can be bought and also downloaded.


Cyber criminals often combine different types of malware to launch a multi-faceted attack on your systems. The ability to recognise various attack methods is as important as the technology you choose to protect your business infrastructure. Here's some strategies a hacker might use against you which are worthy of knowing.


Recent Post

The Cloud Question


Are IT preconceptions holding the business back?


How secure is the Cloud?


The Six R's of Cloud Migration


Cloud Computing and the Property Sector


Related Posts

  • Security
  • Jan

Do we value our data enough to protect it?

I’m sure you know yourself. You know your business. Of course you want to protect everything in it,

Read More
  • Security
  • Jan

Privacy or anonymity? - Which is more important in the digital era?

Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi

Read More
  • Security
  • Jan

If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l

Read More
  • Security
  • Jan

The Cyber Security Landscape - Best Practices to Protect Your Business Data

What business owners consider to be valuable assets will vary from one business owner to another  bu

Read More