1. Worm
The main purpose of this piece of malware is to duplicate malicious
code by any means necessary which often results in a worm spreading
itself over a local network or via email Some types of worm are only
intended to spread themselves without making alterations to the
computers they pass through or to make minimal nuisanc e such as network
slowdown. However they can also be used to give criminals access to
private data or the ability to control an infected workstation.
2. Trojan Horse
this virus works as a thief it transfers data from one to other computer sharply
3. Rootket virus
A Rootkit virus intends to take complete control of the computer operating system by setting itself up as the sole admin account for the
compute Moreover, when a Rootkit virus is installed it is very difficult to remove as it masquerades as important system files, allowing hackers to
install further malicious software undetected.
4. Polymorphic virus
Like a worm virus the Polymorphic virus attempts to duplicate
itself However unlike a worm each copy virus makes of
it self is slightly modified from each other copy Polymorphic viruses
are benefi
cial to hackers as they are extremely hard for antivirus
software to identify and remove.
5. Time / Logic Bombs
this is like a time bomb it is adjusted with time at the given time it destroy all the data
6. Macro virus
A Macro virus infects another piece of software that is programmed
with macro language which includes the . because they are easy to
trick users into installing: simply opening a word attachment from an
email is enough to infect the computer
7. Adware / Spyware
Adware and spyware while less malicious than the above viruses are
still a nuisance for the users to deal with. Adware bombards users with
adverts for products and services while spyware
collects a user browsing habits and personal information before
broadcasting it back to its creator. Any information obtained via these
methods can be sold by the hacker to third parties.and keep it updated.