An unwanted program running on a computer is commonly referred to as malware (short for “malicious software”). Malware is any software designed to damage, disrupt, or gain unauthorized access to a computer system. It includes viruses, worms, Trojans, ransomware, spyware, and adware.
In cases where the program is not harmful but is still unwanted, it might also be called bloatware or PUPs (Potentially Unwanted Programs). These types of software may come bundled with other software, often consuming system resources or displaying unwanted ads.
Here are more types of unwanted programs that can run on a computer:
1. Adware
- Description: Software that displays unwanted advertisements, often in the form of pop-ups or banner ads. While not necessarily malicious, adware can slow down a system and may be bundled with other software without the user’s consent.
- Examples: Ads popping up while browsing, excessive toolbars in your browser.
2. Spyware
- Description: This type of software secretly monitors and collects information about the user’s activities without their knowledge. It often tracks browsing habits, passwords, or other sensitive information.
- Examples: Keyloggers that track every keystroke, programs that track online behavior for targeted ads.
3. Trojans (Trojan Horses)
- Description: A type of malware disguised as legitimate software or files. Users are often tricked into downloading or executing it, which then gives cybercriminals unauthorized access to the system.
- Examples: A “fake” software update or email attachment that turns out to be malicious.
4. Rootkits
- Description: A collection of tools or software used to gain root-level (administrator) access to a system. Rootkits often run hidden on the system, making it difficult to detect and remove them.
- Examples: Software that hides the presence of other malware or allows attackers to maintain control over a compromised machine.
5. Ransomware
- Description: Malware that locks or encrypts a user’s files and demands a ransom to restore access. It’s a type of attack that can be very disruptive and financially damaging.
- Examples: “CryptoLocker” or “WannaCry” ransomware attacks, which demand payment in cryptocurrency to unlock files.
6. Worms
- Description: Self-replicating malware that spreads across networks and infects other systems without needing to attach to files. Unlike viruses, worms do not require human interaction to spread.
- Examples: “Conficker” worm, which spread rapidly across computers via network vulnerabilities.
7. Viruses
- Description: A type of malware that attaches itself to legitimate files or programs and spreads when the infected file is executed. It can damage files, steal information, or disrupt system functionality.
- Examples: The “ILOVEYOU” virus or the “Melissa” virus, which spread via email attachments.
8. Botnets
- Description: A network of infected computers controlled remotely by cybercriminals (often without the user’s knowledge). These infected machines, called “zombies,” are used to carry out large-scale attacks, like Distributed Denial of Service (DDoS) attacks.
- Examples: “Mirai Botnet,” used in large-scale DDoS attacks.
9. Keyloggers
- Description: Malware that records every keystroke a user makes, often used to steal sensitive information like usernames, passwords, and credit card numbers.
- Examples: Software that secretly logs typing activity on a computer and sends it to cybercriminals.
10. PUPs (Potentially Unwanted Programs)
- Description: Programs that aren’t necessarily harmful but are considered undesirable. They often get installed without explicit user consent and may clutter the system or show excessive ads.
- Examples: Unwanted toolbars, automatic system optimizers, or free software that bundles other unnecessary programs.
11. Click Fraud Software
- Description: Software that simulates clicks on advertisements or websites to fraudulently generate revenue for attackers. This type of malware is often used in conjunction with adware.
- Examples: Programs that simulate user interactions with ads to falsely inflate ad views or clicks.
12. Fake Antivirus Programs
- Description: These programs pretend to be legitimate antivirus software but are actually malicious. They often scare users into purchasing unnecessary software or grant attackers access to sensitive data.
- Examples: “Rogue antivirus” software that alerts users about false threats and asks for money to “fix” the issues.
13. Dialers
- Description: Software that dials premium-rate numbers without the user’s knowledge or consent, resulting in large phone bills.
- Examples: Malware that triggers expensive toll charges by dialing international or premium-rate phone numbers.
14. Hijackers
- Description: Programs that alter the default settings of browsers or the operating system, such as changing the homepage or search engine to one that generates revenue for the attacker.
- Examples: Changing your browser’s home page to a different search engine or redirecting search results to sponsored sites.
15. Backdoors
- Description: A method of bypassing normal authentication procedures to gain unauthorized access to a system. Backdoors are often left open by attackers after they gain control of a system.
- Examples: A hacker installing a secret password or program that allows them to access a system remotely at any time.
16. Fileless Malware
- Description: Malware that does not rely on files to execute, instead leveraging system tools and memory to infect and compromise a system. It can be harder to detect than traditional file-based malware.
- Examples: PowerShell-based attacks or exploits that use system processes (e.g., WMI or MSHTA) to run malicious code without leaving traces on the disk.
17. Scareware
- Description: Software that uses fear tactics to manipulate users into purchasing unnecessary software or services. It often displays fake alerts warning about system issues that don’t exist.
- Examples: Pop-up windows or fake system scan alerts claiming the system is infected with numerous viruses.
18. Trojan Downloader
- Description: A type of Trojan that specifically aims to download and install additional malicious software onto the infected system.
- Examples: A Trojan horse that installs ransomware or adware after the user downloads it.
19. Fake Software Updates
- Description: Malware that disguises itself as a legitimate software update (e.g., for Adobe Flash or Java) to trick users into installing malicious software.
- Examples: A fake Adobe Flash update prompt that installs malware when clicked.
20. Creeper Virus (One of the First)
- Description: The first known virus, which was created as an experiment in the early 1970s. It didn’t cause harm but spread through ARPANET (a precursor to the internet) and displayed a message.
- Examples: The Creeper virus itself was non-destructive but is considered a precursor to modern computer viruses.
Ways to Protect Against Unwanted Programs:
- Install Antivirus/Antimalware Software: Keep it up to date to catch and remove malware.
- Use a Firewall: Both software and hardware firewalls can help prevent unauthorized access.
- Update Regularly: Keep your operating system, browsers, and software up to date to close any security vulnerabilities.
- Avoid Suspicious Links/Downloads: Don’t click on questionable links or download software from unreliable sources.
- Backup Your Data: Regular backups can help restore your system if it becomes compromised.
By understanding these various types of unwanted programs, users can better protect their computers and devices from malware and other harmful software.