Most people resort to technology nowadays that they are no stranger to the concept of malicious wares, abbreviated as malware, infiltrating, or damaging their devices and breaching through their personal information. But malware also evolves as technology progresses.

Knowing some of them and how they harm you and your device, however, would help a lot compared to being ignorant of it all. For this reason, we provided a list of the most common types of malware that users often encounter.


Typical forms of malware out there, viruses, as its name suggests, hosts within an already-contaminated operating system or through a program.

Common places where viruses usually house themselves within executable files or word documents. They’re found originally through the Internet, such as within infected websites, file sharing, or email attachment downloads. One thing to note that the virus will not start infecting your device until the infected host file or program is enabled.

Trojan Horses

Just like from the myth it was named from, Trojan Horse is a malicious program that poses as a legitimate file, so users would be more likely to download it but regret the moment it starts attacking your device from within.

Trojan Horse serves as a back door to breach through your device, in which they can have access to your data, spy on your device, or gain access to your network.


Perhaps one of the worst malware that you would rather not come across in your device. Ransomware is a form of software that denies or restricts your files’ access, demanding payment in return for letting you back in.

Ransomware can worm through your device through other security breach programs that serve as a doorway, such as Trojan Horses. To avoid this, always update your operating system to have the latest security patch installed on your device. If you can afford it, get yourself antivirus software to protect your device from newer forms of attacks.


Spyware allows online attackers to secretly peep into your device as it monitors your online activity and gathers data and information, like usernames and passwords.

Spyware is usually working covertly behind freeware or shareware, as it runs in the background with you unaware of it. It’s often used to conduct identity theft or cyber heist.


Adware is the widely-known malware type and, indeed, the most annoying. It gives you unwanted pop-up advertisements that can interfere with your activities on the screen and slow down your devices.

Some of them also provide links to sites containing malicious downloads, such as spyware, making your machine more open to the possibility of being breached and may lead you to scams if you’re not careful.


Please enter your comment!
Please enter your name here