What Is Malware?

Written by Coursera Staff • Updated on

Explore the realm of malware, a critical cybersecurity concern, and understand various malware forms. Learn how to get started in a cybersecurity career.

[Featured image] A closeup shows someone monitoring a cybersecurity feed for malware on a tablet and desktop computer.

Malware is short for “malicious software.” This software has one purpose: to disrupt computer systems like mobile devices. For example, malware may cause damage to a server or grant unauthorised access to information. Malware attacks are the most common form of cyberattack among businesses and organisations.

In 2023, groups initiated over 6.06 billion malware attacks globally [1]. Of these attacks, ransomware spread through email attachments is of particular concern because of its impact on critical industries and threat to healthcare, government, and manufacturing. As new types of malware appear, demand for professionals to protect organisations also increases.

Malware vs virus: What's the difference?

Malware is an umbrella term used to describe many different types of malicious software. A virus is a subtype of malware infection. They earned their name from how they self-replicate and spread throughout a device after infecting just one file or program. All viruses are malware, but not all malware are viruses. 

Placeholder

Common types of malware

Understanding common malware threats is an important first step toward protecting your devices and data from cyberattacks. The list below outlines a few common types of malware, providing you with essential knowledge to enhance your cybersecurity measures.

  • Adware: Adware is unwanted software designed to display or download advertising materials on your computer. 

  • Trojans: Also known as trojan horses, Trojans are malicious code or programs that disguise themselves as legitimate software to trick users into downloading it. 

  • Spyware: Spyware is software that uninstalls itself on your computer. It monitors your online behaviour and gathers information about you to forward to a third party. 

  • Ransomware: Ransomware attacks use encryption to block access to an infected device or file until the owner pays money. Malware developers sometimes leave a ransom note threatening to publish private information. 

  • Worms: A worm is a malicious program replicating itself to spread throughout a network. Unlike viruses, this malware can spread to other computers within a network by exploiting security vulnerabilities. 

Learn how to protect against malware and other cyber threats

Malware, short for "malicious software," can disrupt computer systems, cause damage, or grant unauthorised access to information. As new types of malware emerge, the need for cybersecurity professionals to protect organisations increases, highlighting the ongoing threat and evolving nature of cyberattacks.

Start working toward a career in cybersecurity and consider the Google Cybersecurity Professional Certificate on Coursera. Designed ​​to help individuals with no previous experience find their first job in the field of cybersecurity, all at their own pace, this programme's courses cover topics such as security models, tools used to access and address threats, networks, and more. 

Placeholder

professional certificate

Google Cybersecurity

Get on the fast track to a career in cybersecurity. In this certificate program, you'll learn in-demand skills, and get AI training from Google experts. Learn at your own pace, no degree or experience required.

4.8

(39,566 ratings)

847,002 already enrolled

Beginner level

Average time: 6 month(s)

Learn at your own pace

Skills you'll build:

Python Programming, Security Information and Event Management (SIEM) tools, SQL, Linux, Intrusion Detection Systems (IDS), Packet Analyzer, Security Hardening, Network Security, Transmission Control Protocol / Internet Protocol (TCP/IP), Network Architecture, Cloud Networks, escalation, resume and portfolio preparation, stakeholder communication, Job preparedness, integrity and discretion, Cybersecurity, Information Security (INFOSEC), Ethics in cybersecurity, NIST Cybersecurity Framework (CSF), Historical Attacks, Computer Programming, Coding, PEP 8 style guide, NIST Risk Management Framework (RMF), Security Audits, Incident Response Playbooks, Authentication, vulnerability assessment, Cryptography, asset classification, threat analysis, Command line interface (CLI), Bash

Article sources

  1. Statista. "Malware - Statistics & Facts, https://www.statista.com/topics/8338/malware/#topicOverview". Accessed October 10, 2024.

Updated on
Written by:
Coursera Staff

Editorial Team

Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...

This content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

Whether you're starting your career or trying to advance to the next level, experts at Google are here to help.

Build job-ready skills with access to 10,000+ courses from top universities and companies.