{"id":55282,"date":"2018-08-29T13:20:26","date_gmt":"2018-08-29T20:20:26","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=55282"},"modified":"2024-05-20T11:25:31","modified_gmt":"2024-05-20T18:25:31","slug":"viruses-worms-and-spyware-yikes-a-look-at-malware-terminology","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/","title":{"rendered":"Viruses, Worms, and Spyware\u2014Oh My! A Look at Malware Terminology"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55612\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-terminology.jpg\" alt=\"Malware Terminology\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-terminology.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-terminology-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-terminology-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>When you read about computer security and malware, the terminology can be dizzying. You may feel that you&#8217;ve entered a world with some very strange words whose meanings you can only guess at. In order to help you understand malware, here&#8217;s a look at the most common terms used to describe malicious software that can harm your computer and mobile device, and threaten your security and privacy.<\/p>\n<p>Read on for a comprehensive look at\u00a0malware terminology, including viruses, worms, spyware, and\u00a0all the other dangers that threaten your Mac and your data.<\/p>\n<h3>Malware Terminology<\/h3>\n<p><strong>Malware<\/strong> is the blanket term for all <strong>mal<\/strong>icious soft<strong>ware<\/strong>. It&#8217;s a convenient word, because it can be used for any of the categories I discuss below. Sometimes, a specific piece of malware can be made up of more than one of these categories, so using the blanket term is economical, and makes things easy to understand. In addition, some of these terms describe the way malware is distributed, others the way they propagate, and others the type of actions they perform. Users don&#8217;t always need to know exactly what type of malware has infected their device. Since certain terms used to name malware explain how the software is installed, this can be useful to understand how users can protect themselves. (See phishing, Trojan horse, etc.)<\/p>\n<h3>What is a Computer Virus?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55618\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/virus-def.jpg\" alt=\"Virus Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/virus-def.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/virus-def-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/virus-def-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>A <strong>virus<\/strong>\u00a0on a computer is a specific type of malware that self-replicates, like the similarly-named infectious agents in humans and animals. Like a living virus, computer viruses attach themselves to hosts in order to move around and reproduce. The term virus indicates the means of replication, not the way the malware acts on a computer. Viruses used to travel on floppy disks and CD-ROMs; now they move around over the Internet, hiding inside files and applications, or spread via infected USB sticks. The term virus is often used as a blanket term, while the word malware is generally more appropriate. And, because historically viruses were the first type of malware that attacked personal computers, the security industry often uses the term &#8220;anti-virus&#8221; for software that detects and eradicates malware.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: A proof of concept virus, identified as\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/clapzok-a-multi-platform-virus\/\" target=\"_blank\" rel=\"noopener\">Multi\/Clapzok.A,<\/a>\u00a0targeted Windows, Linux and OS X 32-bit executables.<\/p>\n<h3>What is a Worm?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55624\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/worm-definition.jpg\" alt=\"Worm Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/worm-definition.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/worm-definition-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/worm-definition-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>On a computer, a\u00a0<strong>worm<\/strong> is similar to a virus, in that it replicates itself. But unlike viruses, worms don&#8217;t need to be attached to other files. They often replicate over networks, rendering them particularly dangerous.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: The &#8220;Oompa-Loompa&#8221; worm, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/\" target=\"_blank\" rel=\"noopener\">discovered by Intego on February 16, 2006<\/a>\u00a0and identified as OSX\/Oomp.A, targeted Mac OS X users via iChat instant messenger.<\/p>\n<h3>What is a\u00a0Trojan Horse?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55627\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/trojan-horse-definition.jpg\" alt=\"Trojan Horse Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/trojan-horse-definition.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/trojan-horse-definition-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/trojan-horse-definition-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>A <strong>Trojan horse<\/strong>, or simply <strong>Trojan<\/strong>, is a type of malware that is disguised as a useful piece of software or data file. It may actually perform actions on a computer that are or seem legitimate, but will install malware or perform malicious actions. A Trojan horse may also be legitimate software that has been altered to install malware. The name comes from the wooden horse that the Greeks made to attack the city of Troy. Obviously, the people in that city didn&#8217;t know that they shouldn&#8217;t open unsolicited attachments.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/\" target=\"_blank\" rel=\"noopener\">The Ventir Trojan<\/a>, identified by Intego VirusBarrier as OSX\/Ventir, used a\u00a0dropper program (e.g. Trojan horse) to infect Macs.<\/p>\n<h3>What is\u00a0Ransomware?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55633\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-definition.jpg\" alt=\"Ransomware Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-definition.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-definition-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-definition-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><strong>Ransomware<\/strong> is a type of malware that locks a computer or hijacks a user&#8217;s files until a ransom is paid. It can be installed by a Trojan horse, or downloaded when visiting a malicious website. Ransomware is big business, with cyber-criminals making a lot of money from users who need to access their files. These people often have sophisticated fulfillment setups, with call centers and customer support to take payments. The best prevention against ransomware, other than using anti-malware software, is to regularly back up your files, so you always have a copy of them available.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-hit-by-rare-ransomware-attack-spread-via-transmission-bittorrent-app\/\" target=\"_blank\" rel=\"noopener\">KeRanger<\/a>, detected by Intego VirusBarrier as OSX\/KeRanger, was the first major macOS ransomware.<\/p>\n<h3>What is a Botnet?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55660\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/botnet-definition.jpg\" alt=\"Botnet Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/botnet-definition.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/botnet-definition-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/botnet-definition-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>A\u00a0<strong>botnet<\/strong>\u00a0is a network of computers whose access has been compromised, and that are controlled remotely. These individual computers are often called\u00a0<strong>bots<\/strong>\u00a0or\u00a0<strong>zombies<\/strong>. Botnets are generally used to send spam emails, or to launch denial of service attacks, where thousands of computers block a website or server by flooding that server with more requests than it can handle.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: iWorm, detected as<a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\" target=\"_blank\" rel=\"noopener\"> OSX\/iWorm, is a sophisticated botnet that used Reddit<\/a>\u00a0to communicate to infected Macs.<\/p>\n<h3>What is a Keylogger?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55663\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/keylogger-definition.jpg\" alt=\"Keylogger Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/keylogger-definition.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/keylogger-definition-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/keylogger-definition-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>A\u00a0<strong>keylogger<\/strong>, or <strong>keystroke logger<\/strong>,\u00a0is a type of malware that records all keystrokes that a user types on their computer. A keylogger can also be a hardware device, connected somewhere between a keyboard and a computer. Keyloggers can record all sorts of personal information, such as user names, passwords, credit card numbers, and personal documents such as emails and reports. Keyloggers can be useful to obtain information that can be later used to access a user&#8217;s online accounts, or for espionage.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: Spyware called\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-spyware-discovered-osxdockster-a\/\" target=\"_blank\" rel=\"noopener\">OSX\/Dockster.A<\/a> included a keylogger component that recorded an affected user&#8217;s typing.<\/p>\n<h3>What is a Rootkit?<\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55699\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/rootkit-def.jpg\" alt=\"Rootkit Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/rootkit-def.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/rootkit-def-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/rootkit-def-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>A\u00a0<strong>rootkit<\/strong>\u00a0is software that gives a malicious user &#8220;root access,&#8221; or total control over a computer. It can be installed via a\u00a0Trojan horse, through a\u00a0phishing\u00a0attack, or in other ways. A rootkit is a virtual\u00a0backdoor, and when installed on a computer, malicious users can control the computer and access all its files. Rootkits often mask their presence, or the presence of other\u00a0malware.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: A\u00a0Trojan dropper threat, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-apple-mac-trojan-called-osxcrisis-discovered-by-intego-virus-team\/\" target=\"_blank\" rel=\"noopener\">detected by Intego VirusBarrier as OSX\/Crisis<\/a>,\u00a0would drop a rootkit to hide itself.<\/p>\n<h3>What is a Backdoor, and What is a RAT?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-55651\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/backdoor-definition.png\" alt=\"Backdoor Definition\" width=\"500\" height=\"248\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/backdoor-definition.png 555w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/backdoor-definition-150x74.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/backdoor-definition-300x149.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>A <strong>backdoor<\/strong> is a way to access a computer or device without authentication. It may provide access to encrypted files without requiring a user&#8217;s password or passcode, or it may offer a means of accessing all the files on a computer. In some cases, manufacturers or developers create intentional backdoors so they can restore access to users who are locked out of a system, or to reset a device to factory settings.<\/p>\n<p>A <strong>RAT<\/strong>, short for remote administration tool or remote access Trojan, is a type of backdoor that gives an attacker similar remote control, data exfiltration, and spying capabilities, and often includes a keystroke logger.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: Mac malware\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\" target=\"_blank\" rel=\"noopener\">identified as OSX\/Eleanor<\/a>\u00a0masqueraded as a file converter app and would open a backdoor on infected Macs to steal data, execute code, and more. There are <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/\" target=\"_blank\" rel=\"noopener\">many examples of Mac RATs<\/a>, such as OSX\/CrossRAT (part of a global cyber-espionage campaign) and OSX\/EvilOSX (an open-source RAT that anyone can download and customize).<\/p>\n<h3>What is Spyware?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-55678\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/spyware-definition.png\" alt=\"Spyware Definition\" width=\"500\" height=\"265\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/spyware-definition.png 565w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/spyware-definition-150x80.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/spyware-definition-300x159.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><strong>Spyware<\/strong>\u00a0is malicious software that spies on a user. It may record keystrokes (i.e. keylogger) such as user names and passwords, track user activity on the internet, or activate the camera or microphone on a computer to see or hear what the user is doing.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: Spyware ported from Windows to OS X, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/spyware-xslcmd-malware-os-x\/\" target=\"_blank\" rel=\"noopener\">identified as OSX\/XSLCmd<\/a>, included key logging and screen capturing capabilities.<\/p>\n<h3>What is Adware?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55675\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/adware-definition.jpg\" alt=\"Adware Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/adware-definition.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/adware-definition-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/adware-definition-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><strong>Adware<\/strong>\u00a0is software that causes advertisements to be displayed on a computer&#8217;s desktop or in a web browser, in order to generate income from these ads being shown. Some free software displays ads, and is technically not adware; the term is generally used for malicious software, which users cannot remove easily.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: A shady adware installer, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/softonic-download-site-briefly-delivers-trojan-adware-installer\/\" target=\"_blank\" rel=\"noopener\">detected\u00a0as OSX\/Okaz.A<\/a>, was discovered embedded in fake software downloaded from Softonic.<\/p>\n<h3>Phishing\u00a0vs.\u00a0Spear Phishing<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-56032\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-definition1.jpg\" alt=\"Phishing Definition\" width=\"451\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-definition1.jpg 550w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-definition1-150x100.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-definition1-300x200.jpg 300w\" sizes=\"(max-width: 451px) 100vw, 451px\" \/><\/p>\n<p><strong>Phishing<\/strong>\u00a0occurs when cyber-criminals send emails that look exactly like those from real companies\u2014banks, PayPal, Amazon, Apple, and others\u2014to trick you into logging into your account through poisoned links. These links take you to websites that look real, but that are designed simply to harvest your credentials: your user names, passwords, and credit card numbers. Phishing may also take you to a website designed to install malware on your computer, such as ransomware, spyware, adware, and so on.<\/p>\n<p><strong>Spear phishing<\/strong>\u00a0is a kind of\u00a0<strong>phishing<\/strong>\u00a0that is generally targeted at a specific person, and isn&#8217;t as random as phishing. It purports to come from someone you know: a business you work with, or a person in your contacts. Its goal is, like phishing, to obtain information about you, such as your user name and password to online accounts, or to your user account on your computer.<\/p>\n<p><span style=\"text-decoration: underline;\">Example<\/span>: Scammers found a way to generate<a href=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" target=\"_blank\" rel=\"noopener\"> a vast number of phishing websites<\/a> all designed to steal Apple IDs and passwords.<\/p>\n<h3>Exploits\u00a0vs.\u00a0Vulnerabilities vs.\u00a0Zero-Day Flaws<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55696\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/exploit-definition.jpg\" alt=\"Exploit Definition\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/exploit-definition.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/exploit-definition-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/exploit-definition-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>An\u00a0<strong>exploit<\/strong>\u00a0is what malicious users leverage to take advantage of\u00a0<strong>vulnerabilities<\/strong>. It could be a piece of software or code injected into web pages that allows malicious users to gain access to a computer or to its files. Exploits often use vulnerabilities to install malware such as\u00a0Trojan horses,\u00a0ransomware, and more.<\/p>\n<p>A\u00a0<strong>vulnerability<\/strong>\u00a0is a flaw or weakness in an operating system or application that allows malicious users to gain access to a computer, or to infect files. A vulnerability could be the result of a bug or of poor design. Vulnerabilities in web browsers and plug-ins, such as Adobe Flash, are often targeted, since this software is so widely used.<\/p>\n<p>A\u00a0<strong>zero-day vulnerability<\/strong>\u00a0is one that has been recently discovered, but not yet corrected by a software developer. The term comes from the idea that the developer has\u00a0<em>zero days<\/em>\u00a0to correct the vulnerability before malicious users begin to\u00a0exploit\u00a0it. Software updates are required as soon as possible to protect against these vulnerabilities.<\/p>\n<h3>Malware vs. Vulnerabilities<\/h3>\n<p>The difference between malware and vulnerabilities is the difference between software made with the intent to cause harm, and the absence of security in a product. Malware is something you can see, interact with, and analyze, whereas a vulnerability is a weakness in software or hardware that can be exploited by malware or a hacker. That may sound a bit esoteric, so let&#8217;s break down the differences even further.<\/p>\n<p>Take a look at the below infographic for a more detailed look at the differences between malware and vulnerabilities:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55912\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-vs-vulnerabilities-infographic.jpeg\" alt=\"Malware vs. Vulnerabilities Infographic\" width=\"1200\" height=\"3509\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-vs-vulnerabilities-infographic.jpeg 1200w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-vs-vulnerabilities-infographic-51x150.jpeg 51w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-vs-vulnerabilities-infographic-103x300.jpeg 103w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-vs-vulnerabilities-infographic-350x1024.jpeg 350w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/malware-vs-vulnerabilities-infographic-657x1921.jpeg 657w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>No matter how savvy a Mac user is, any piece of malware is one password or vulnerability away from taking over your machine. Security is about layers, and one layer failing shouldn&#8217;t defeat all security;\u00a0therefore, it&#8217;s imperative to rely on multiple layers of protection with different properties. Regularly updating\u00a0third-party\u00a0software and passwords, scheduling routine backups, and running a trusted macOS security\u00a0solution with real-time antivirus protection should be an essential part of your security strategy.<\/p>\n<p><strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Mac Premium Bundle X9<\/a><\/strong> is the most complete Mac security solution providing\u00a0multiple layers of protection. It boasts\u00a0real-time antivirus scanning and\u00a0anti-phishing features, and\u00a0a two-way firewall with\u00a0anti-spyware measures to protect outgoing data sent from your Mac. It\u00a0even includes a Mac cleaner to optimize your Mac, and Intego Personal Backup for a layer of\u00a0ransomware protection. Mac Premium Bundle fortifies your Mac with layers of protection against all different types of malware.<\/p>\n<hr \/>\n<address><em>This story comes to you as part of our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/think-security\/\" target=\"_blank\" rel=\"noopener\">Think Security<\/a> series helping students and parents prepare for back to school, with educational guides and Mac tips and tricks.<\/em><\/address>\n","protected":false},"excerpt":{"rendered":"<p>The difference between malware and a virus, worm or spyware (or even vulnerabilities) can be confusing. Here&#8217;s an in-depth look at malware terminology.<\/p>\n","protected":false},"author":46,"featured_media":56062,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[323,30,505,419,52,159,3076,86,3073,102,109,517,319,3079,125,3085,132,160,144,150,982],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The difference between malware and a virus, worm or spyware (or even vulnerabilities) can be confusing. Here&#039;s an in-depth look at malware terminology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Viruses, Worms, and Spyware\u2014Oh My! A Look at Malware Terminology - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The difference between malware and a virus, worm or spyware (or even vulnerabilities) can be confusing. Here&#039;s an in-depth look at malware terminology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-29T20:20:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-20T18:25:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png\",\"width\":400,\"height\":260,\"caption\":\"Difference Between Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\",\"name\":\"Viruses, Worms, and Spyware\\u2014Oh My! A Look at Malware Terminology - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#primaryimage\"},\"datePublished\":\"2018-08-29T20:20:26+00:00\",\"dateModified\":\"2024-05-20T18:25:31+00:00\",\"description\":\"The difference between malware and a virus, worm or spyware (or even vulnerabilities) can be confusing. Here's an in-depth look at malware terminology.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Viruses, Worms, and Spyware\\u2014Oh My! A Look at Malware Terminology\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Viruses, Worms, and Spyware\\u2014Oh My! A Look at Malware Terminology\",\"datePublished\":\"2018-08-29T20:20:26+00:00\",\"dateModified\":\"2024-05-20T18:25:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#webpage\"},\"wordCount\":1886,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png\",\"keywords\":[\"Adware\",\"Backdoor\",\"Botnet\",\"Clapzok\",\"Exploit\",\"Infographic\",\"Keylogger\",\"Malware\",\"Malware Terminology\",\"Phishing\",\"Ransomware\",\"Rootkit\",\"Security\",\"Spear Phishing\",\"Spyware\",\"Think Security\",\"Trojan Horse\",\"Virus\",\"Vulnerability\",\"Worm\",\"Zero Day\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The difference between malware and a virus, worm or spyware (or even vulnerabilities) can be confusing. Here's an in-depth look at malware terminology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/","og_locale":"en_US","og_type":"article","og_title":"Viruses, Worms, and Spyware\u2014Oh My! A Look at Malware Terminology - The Mac Security Blog","og_description":"The difference between malware and a virus, worm or spyware (or even vulnerabilities) can be confusing. Here's an in-depth look at malware terminology.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-08-29T20:20:26+00:00","article_modified_time":"2024-05-20T18:25:31+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png","width":400,"height":260,"caption":"Difference Between Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/","name":"Viruses, Worms, and Spyware\u2014Oh My! A Look at Malware Terminology - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#primaryimage"},"datePublished":"2018-08-29T20:20:26+00:00","dateModified":"2024-05-20T18:25:31+00:00","description":"The difference between malware and a virus, worm or spyware (or even vulnerabilities) can be confusing. Here's an in-depth look at malware terminology.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Viruses, Worms, and Spyware\u2014Oh My! A Look at Malware Terminology"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Viruses, Worms, and Spyware\u2014Oh My! A Look at Malware Terminology","datePublished":"2018-08-29T20:20:26+00:00","dateModified":"2024-05-20T18:25:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#webpage"},"wordCount":1886,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png","keywords":["Adware","Backdoor","Botnet","Clapzok","Exploit","Infographic","Keylogger","Malware","Malware Terminology","Phishing","Ransomware","Rootkit","Security","Spear Phishing","Spyware","Think Security","Trojan Horse","Virus","Vulnerability","Worm","Zero Day"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/difference-between-malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-enE","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/55282"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=55282"}],"version-history":[{"count":105,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/55282\/revisions"}],"predecessor-version":[{"id":97980,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/55282\/revisions\/97980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/56062"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=55282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=55282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=55282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}