What Is The Difference Between A Worm, Trojan and a virus?

By -

Some people call “virus” to any type of malicious software, but this is not entirely accurate. Viruses, worms and Trojan horses are malicious software different types with different modes of operation. Specifically, they spread themselves in very different ways.

We usually say “malware” when it comes to malware. If you want a term that encompasses all software created with bad intent, “malware” is the word to use. The good news is that your antivirus program does not matter what name has this eliminates malware-like worms, Trojans and other types of malware.

Viruses infect other files

A computer virus infects other files, similar to a biological virus infects living cells. When you run a virus launching a file already infected, the virus infects other files to turn your system. In most cases, it adds itself to other files. Exe extension on your system, so that will activate when they do.

Some viruses can also infect other files, such as macros Word documents or Excel. The virus spreads when an infected file is transmitted to another system. This can occur via email attachments, removable storage device or a file sharing network.

worm virus

Viruses also cause havoc with your system. In some cases, can completely replace program files installed by them or adding to existing programs. They can delete files and announce their presence to the user. And they can get to the system memory and cause crashes and the same.

Viruses are dangerous due to the way in which they propagate. When a legitimate file is transferred between systems, the virus is inside.

Worms replicate themselves

A worm is a program that does not require user intervention to spread. Worms do not infect existing files – instead, what they do is spread copies of themselves.

Some worms, like the infamous Mydoom worm sends copies of itself to email addresses each of existing on the agenda of the computer. Some of the most dangerous worms and rapid spread, such as Blaster and Sasser worms, exploit vulnerabilities in network services. Instead of sending files by email, travel through the network and infect unpatched systems that have no active firewalls.


These worms spread over the network can generate a huge amount of traffic, slowing the speed of network connections. Once you have a worm in your system, it can perform the same actions of a malicious virus.

The Trojans Resting In The Wait

The Trojans are named after the mythological Trojan horse. To conquer the city of Troy, the Greeks built a wooden horse and presented it to the Trojans as a gift. The Trojans accepted it and introduced it into their city. Late at night, Greek soldiers went inside the hollow wooden horse, opened the gates of the city-and you can imagine what happened next.

A Trojan is the same kind of thing. The Trojans are camouflaged under the guise of a useful software, like any legitimate program or a crack unlawful for an original program. But instead of running for the user, what it does is open a backdoor on your system.


The creator of the Trojan can entoncer use this backdoor to your system becomes part of a botnet, using your internet connection for illegal activities will leave a trail to your computer, download other malware on your system, or any else you want.

Trojans can not spread in any way seek. The Trojans must be executed manually by the user to activate.

Other Threats

These are not the only types of malware in existence. Here are a few other fairly common:

  • Spyware – Spyware spies on you. Spyware includes everything from “key loggers” which record the keystrokes on the keyboard, then steal information from your credit card and online banking passwords-up advertising programs that monitor your web browsing and collect the information to others. Spyware is usually designed to make money for their creators. Some antivirus programs do not detect or eliminate this kind of software, but Windows Defender is included in Windows 7, yes it does.

Internet theft

  • Scareware – The scareware, also known as crimeware, often appears as a (false) virus alert on a website. If you think this alert and you download the (fake) antivirus program informs you that you have virus on your system.The antivirus program will ask the number of your credit card in insitiendo you make a payment before “fix” your system. The Scareware keeps your system as a hostage until you pay or get removed.

Keep your operating system and other programs and pass an updated antivirus program frequently to protect yourself from these dangers

He has over 5 years of experience as Online Media and Marketing Consultant, which allow him to enable companies to enhance and meet their Digital marketing goals. He has experience as both in-house and Agency Digital Marketing Experts. Ha has spent the most recent 4 years of his career focusing building Strong terms of Digital Marketing for his clients. In addition to his strengths on Building Brands and Serving Online Marketing strategy for his clients.

Comments are closed.