Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Viruses, Trojans, and Worms: What’s the Difference?

2018/12/01 by Cathy Burnham

green data matrixThere are many different types of malware, and some of the most common include viruses, Trojans, and worms. While the terms are often used interchangeably, each of these types of malware has significant differences.

Viruses
A computer virus is a malicious program that can cause damage by creating, moving or erasing files. Opening an infected email attachment is the most common way for your machine to catch a computer virus.

Trojans
Named after the mythological Trojan Horse, a Trojan is a malicious program which misleads users of its true intent. It is typically hidden in an email attachment or download that appears to be authentic. When the user clicks the attachment or downloads the program, the malware hidden inside is transferred to the user’s device. Once inside, a Trojan can cause damage by deleting files, stealing data, and more.

Worms
A computer worm is a program that can replicate itself and spread to other computers. While it cannot alter any files on a machine, it can cause harm consuming all of the endpoint’s available memory or disk space as it multiplies. In this case, endpoint protection software is essential as it can locate and destroy worms before they have a chance to replicate or spread to other machines.

Filed Under: Uncategorized

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Google Suspends Chinese Shopping App Amid Security Concerns
  • Verosint Launches Account Fraud Detection and Prevention Platform
  • Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement