Virus A peace of code. malicious intent. It requires human interaction to spread tha infection. Its comes from usb, email attachment/ pirated software download.
Worm a worm can self-replicate without a host program and typically spreads without any human interaction or directives from tha malware authors. Example wannacry
Trojan harmless looking app/exe, bind malicious file with another app and look like exactly normal app.
Keyloggers a keylogger records every keystroke you type on computer’s keyboard. With this information, a attacker find out your username and password for a range of sites without even seeing what comes up on tha screen. there are two types of keystrokes
Ransomware ransomware is designed to infect a user’s system and encrypt tha data. Cybercriminal then demand a ransom payment from tha victim in exchange for decrypting tha system’s date
Rootkita rootkit is created to obtain administrator-level access to tha victim’s system. Once installed, tha program gives thread actors root or privileged access to tha system.