Computer science student J
Category - MALWARE HISTORY
Just like biological viruses can not exist, multiply and spread in the absence of an animal host, computer viruses are closely tied to electronic computing...
Spyware applications are pieces of software that stealthily install and monitor users
Trojan horses are probably the widest-spread security threats nowadays.
Rootkits are extremely advanced pieces of malware, built with complete stealth in mind.
Exploits target specific vulnerabilities in the software running on a system.
Backdoors are security risks that allow attackers to remotely and stealthily access a computer using either plain-text or fully visual interfaces.
Worms are also self-replicating programs that stealthily spread across computer networks.
As previously stated, malware is an umbrella term that covers multiple security threats.