{"id":7454,"date":"2012-12-06T08:43:53","date_gmt":"2012-12-06T16:43:53","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=7454"},"modified":"2017-01-06T15:17:26","modified_gmt":"2017-01-06T23:17:26","slug":"whats-the-difference-between-malware-trojan-virus-and-worm","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/","title":{"rendered":"What&#8217;s the Difference Between Malware, Trojan, Virus, and Worm?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-4761 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02.jpg\" alt=\"What is the difference between malware, virus, trojan, worm?\" width=\"560\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02.jpg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02-300x214.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02-100x71.jpg 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they often get used incorrectly. One of the most frequently (and painfully) misused groups is the terms that differentiate malware from other types of vulnerabilities and threats. I thought I&#8217;d clear up the confusion by explaining what malware, trojans, viruses, and worms are and how they&#8217;re different from one another.<\/p>\n<h4><a title=\"Mac antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\"><strong>Don&#8217;t forget to protect your\u00a0Mac\u00a0from viruses, malware\u00a0and everything in between: Download Mac Internet Security X8 and get protected\u00a0today.<\/strong><\/a><\/h4>\n<p>Here\u2019s the basic definition for all the terms we\u2019ll discuss here:<\/p>\n<ul>\n<li><strong>Malware:<\/strong><br \/>\nThis is a big catchall phrase that covers all sorts of software with nasty intent. Not buggy software, not programs you don\u2019t like, but software which is specifically written with the intent to harm.<\/li>\n<li><strong>Virus: <\/strong><br \/>\nThis is a specific type of malware that spreads itself once it\u2019s initially run. It&#8217;s different from other types of malware because it can either be like a parasite that attaches to good files on your machine, or it can be self-contained and search out other machines to infect.<\/li>\n<li><strong>Worm: <\/strong><br \/>\nThink of inchworms rather than tapeworms. These are not parasitic worms, but the kind that move around on their own. In the malware sense, they&#8217;re viruses that are self-contained (they don\u2019t attach themselves like a parasite) and go around searching out other machines to infect.<\/li>\n<li><strong>Trojan: <\/strong><br \/>\nDo you remember that story you had to read in high school about the big wooden horse that turned out to be full of guys with spears? This is the computer equivalent. You run a file that is supposed to be something fun or important, but it turns out that it\u2019s neither fun nor important, and it\u2019s now doing nasty things to your machine.<\/li>\n<li><strong>Vulnerability<br \/>\n<\/strong>Funny thing about software: it\u2019s written by humans. Humans are fallible and sometimes forget to cross t&#8217;s and dot i&#8217;s. Sometimes those mistakes create strange behavior in programs. And sometimes that strange behavior can be used to create a hole that malware or hackers could use to get into your machine more easily. That hole is otherwise known as a vulnerability.<\/li>\n<li><strong>Exploit<\/strong><br \/>\nThe strange behavior that can be used to create a hole for hackers or malware to get through generally requires someone to use a particular sequence of actions or text to cause the right (or is that wrong?) conditions. To be usable by malware (or on a larger scale by hackers), it needs to be put into code form, which is also called exploit code.<\/li>\n<\/ul>\n<p>So, how do these definitions play out in real life?<\/p>\n<p>Malware is the big umbrella term.\u00a0It covers viruses, worms and Trojans, and even exploit code. But not vulnerabilities or buggy code, or products whose business practices you don\u2019t necessarily agree with.<\/p>\n<p align=\"center\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-7723\" title=\"umbrella\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/umbrella.jpg\" alt=\"\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/umbrella.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/umbrella-150x112.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/umbrella-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/umbrella-100x75.jpg 100w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Malware = umbrella term.<\/em><\/p>\n<p>The difference between malware and vulnerabilities is like the difference between something and the absence of something. Yeah, okay, that\u2019s a bit esoteric. What I mean is malware is a something. You can see it, interact with it, and analyze it. A vulnerability is a weakness in innocent software that a something (like malware or a hacker) can go through.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-flashback\/\">Flashback<\/a> is an example of malware that exploited a vulnerability to take over people\u2019s machines. The authors slipped malicious exploit code into otherwise-innocent websites, and this code utilized a vulnerability within Java in order to silently install itself.<\/p>\n<p>Virus is a slightly smaller sort of umbrella term that covers anything that spreads itself without additional human intervention beyond that first double-click.<\/p>\n<p align=\"center\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-7724\" title=\"tiny-umbrella\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/tiny-umbrella.jpg\" alt=\"\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/tiny-umbrella.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/tiny-umbrella-150x112.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/tiny-umbrella-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/tiny-umbrella-100x75.jpg 100w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Virus = smaller umbrella.<\/em><\/p>\n<p>It could spread parasitically, meaning the virus code attaches itself to otherwise-innocent files, and keeps infecting more and more files whenever that infected file is run. Viruses can either be destructive (including spying behavior) or they could just be intended to do nothing other than to spread. Non-destructive viruses are pretty rare these days, as everything has become financially motivated.<\/p>\n<p>A virus requires the presence of those innocent files in order to spread. The other scenario is that it could spread as a static, self-contained file. The self-contained file sends itself through shared network connections, by attaching itself to emails or IMs, or even just by sending a link in email or IM to download the file. In this latter, static case, the specific type of virus is called a worm.<\/p>\n<p align=\"center\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-7725\" title=\"inchworm\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/inchworm.jpg\" alt=\"\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/inchworm.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/inchworm-150x112.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/inchworm-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/inchworm-100x75.jpg 100w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p align=\"center\"><em>Worms are no fun.<\/em><\/p>\n<p>The difference between a worm and a Trojan is a tricky one that may not seem to matter much if you\u2019re the one being affected. If you got infected with the <a href=\"http:\/\/www.theregister.co.uk\/2001\/01\/19\/mac_users_hit_by_melissa\/\">Melissa email worm<\/a> way back when, you may remember the difference: you don\u2019t have to worry about just your own machine getting messed up, now you have to worry about those first 50 people in your email address book who\u2019ve now just been sent a copy. (Those people are probably gonna be pretty righteously peeved at you.)<\/p>\n<p>Trojans really have only one purpose, and that is to cause damage.<\/p>\n<p align=\"center\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-7726\" title=\"trojan-horse\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/trojan-horse.jpg\" alt=\"\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/trojan-horse.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/trojan-horse-150x112.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/trojan-horse-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/trojan-horse-100x75.jpg 100w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Don&#8217;t be fooled!<\/em><\/p>\n<p>They often have identical destructive functionality to some viruses; they just lack the ability to spread on their own. Trojans must be planted somewhere people are likely to run across them (like Flashback), or they must be sent directly (like in a targeted attack such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-osx-imuler-variant-targeting-tibetan-activists\/\">Imuler<\/a>). This confusion is what leads some people to refer to things as \u201cTrojan viruses,\u201d even though those two terms are mutually exclusive.<\/p>\n<p>Hopefully that clears things up a bit! If you have any questions about malware, trojans, viruses, and worms, drop them in the comments.<\/p>\n<div>\n<hr>\n<div>\n<p><strong>Now that you know the difference between each malware, it&#8217;s time to take action!<\/strong><\/p>\n<p>Protect your Mac from all known\u00a0malware:\u00a0<a title=\"Mac antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Download Intego VirusBarrier today!<\/a><\/p>\n<\/div>\n<\/div>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/annagaycoan\/3498530312\/\">Loca Luna \/ Anna Gay<\/a>, <a href=\"http:\/\/www.flickr.com\/photos\/azadam\/72258450\/\">AZAdam<\/a>, <a href=\"http:\/\/www.flickr.com\/photos\/patduffy\/5933846004\/\">Pat_Duffy<\/a>, <a href=\"http:\/\/www.flickr.com\/photos\/mrezafaisal\/7274186704\/\">M Reza Faisal<\/a>, <a href=\"http:\/\/www.flickr.com\/photos\/mag3737\/261222634\/\">mag3737<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they often get used incorrectly. One of the most frequently (and painfully) misused groups is the terms that differentiate malware from other types of vulnerabilities and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9217,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[86,299,160,150],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s the Difference Between Malware, Trojan, Virus, and Worm? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-06T16:43:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:17:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/\",\"name\":\"What's the Difference Between Malware, Trojan, Virus, and Worm? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#primaryimage\"},\"datePublished\":\"2012-12-06T16:43:53+00:00\",\"dateModified\":\"2017-01-06T23:17:26+00:00\",\"description\":\"There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s the Difference Between Malware, Trojan, Virus, and Worm?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What&#8217;s the Difference Between Malware, Trojan, Virus, and Worm?\",\"datePublished\":\"2012-12-06T16:43:53+00:00\",\"dateModified\":\"2017-01-06T23:17:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#webpage\"},\"wordCount\":998,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg\",\"keywords\":[\"Malware\",\"Trojan\",\"Virus\",\"Worm\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/","og_locale":"en_US","og_type":"article","og_title":"What's the Difference Between Malware, Trojan, Virus, and Worm? - The Mac Security Blog","og_description":"There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they","og_url":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-12-06T16:43:53+00:00","article_modified_time":"2017-01-06T23:17:26+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/","name":"What's the Difference Between Malware, Trojan, Virus, and Worm? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#primaryimage"},"datePublished":"2012-12-06T16:43:53+00:00","dateModified":"2017-01-06T23:17:26+00:00","description":"There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s the Difference Between Malware, Trojan, Virus, and Worm?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What&#8217;s the Difference Between Malware, Trojan, Virus, and Worm?","datePublished":"2012-12-06T16:43:53+00:00","dateModified":"2017-01-06T23:17:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#webpage"},"wordCount":998,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg","keywords":["Malware","Trojan","Virus","Worm"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/question-mark-reg-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1We","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/7454"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=7454"}],"version-history":[{"count":37,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/7454\/revisions"}],"predecessor-version":[{"id":60952,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/7454\/revisions\/60952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9217"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=7454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=7454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=7454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}