Skip navigation

What is Malware?

Malware, short for malicious software, refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware. Recent malware attacks have exfiltrated data in mass amounts.

Primary button Secondary button

What is the intent of malware?

Malware is developed as harmful software that invades or corrupts your computer network. The goal of malware is to cause havoc and steal information or resources for monetary gain or sheer sabotage intent.


A headline for a section of statistics and important data

Tens of thousands of customers depend on Cisco Duo to prevent unauthorized access.

The statistic of 1 billion plus representing how many authentications Duo does on an monthly basis.
Monthly User Authentications
The number of 100,000 which is the number of customers Duo currently has globally.
Customers Globally
The of 159 percent which is the return on investment Cisco Duo stated in Forrester's TEI report.
Return on Investment*

*The Total Economic Impact™ of Cisco Duo, a commissioned study conducted by Forrester Consulting, February 2023. Results are based on a composite organization.


How do I protect my network against malware?

Typically, businesses focus on preventative tools to stop breaches. By securing the perimeter, businesses assume they are safe. However, some advanced malware will eventually make their way into your network. As a result, it is crucial to deploy technologies that continually monitor and detect malware that has evaded perimeter defenses. Sufficient advanced malware protection requires multiple layers of safeguards along with high-level network visibility and intelligence.


How do I detect and respond to malware?

Malware will inevitably penetrate your network. You must have defenses that provide significant visibility and breach detection. To remove malware, you must be able to identify malicious actors quickly. This requires constant network scanning. Once the threat is identified, you must remove the malware from your network. Today's antivirus products are not enough to protect against advanced cyberthreats.

Learn how to update your antivirus strategy


Inside Talos Threat Hunters

Discover how Talos threat hunters identify new and evolving threats in the wild, and how their research and intelligence helps organizations build strong defenses.


7 types of malware

Virus


Viruses are a subgroup of malware. A virus is malicious software attached to a document or file that supports macros to execute its code and spread from host to host. Once downloaded, the virus will lie dormant until the file is opened and in use. Viruses are designed to disrupt a system's ability to operate. As a result, viruses can cause significant operational issues and data loss.


Worms


A worm is a type of malicious software that rapidly replicates and spreads to any device within the network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a device through a downloaded file or a network connection before it multiplies and disperses at an exponential rate. Like viruses, worms can severely disrupt the operations of a device and cause data loss.


Adware


Adware is malicious software used to collect data on your computer usage and provide appropriate advertisements to you. While adware is not always dangerous, in some cases adware can cause issues for your system. Adware can redirect your browser to unsafe sites, and it can even contain Trojan horses and spyware. Additionally, significant levels of adware can slow down your system noticeably. Because not all adware is malicious, it is important to have protection.


What are the benefits of advanced malware protection?

Advanced malware can take the form of common malware that has been modified to increase its capability to infect. It can also test for conditions of a sandbox meant to block malicious files and attempt to fool security software into signaling that it is not malware. Advanced malware protection software is designed to prevent, detect, and help remove threats in an efficient manner from computer system.

Types of advanced malware protection

Frequently Asked Questions

What is zero trust?

Zero trust is a strategy for securing your business by eliminating excessive trust and continually verifying trust – of a user, device, application, or network – before access is granted.

What are the principles of a zero trust architecture?

Zero trust is a strategy for securing your business by eliminating excessive trust and continually verifying trust – of a user, device, application, or network – before access is granted.

What are the functional requirements of a zero trust platform?

Zero trust is a strategy for securing your business by eliminating excessive trust and continually verifying trust – of a user, device, application, or network – before access is granted.

What are some examples of zero trust in action?

Zero trust is a strategy for securing your business by eliminating excessive trust and continually verifying trust – of a user, device, application, or network – before access is granted.