Is your mobile device slower than usual or constantly crashing? Are apps or programs popping up that you don't have installed? Are pop-ups constantly appearing on your screen? Or does your mobile device simply feel strange? Then your device could be infected with malware. Here we explain what malware is and how you can protect yourself against it. Malware is made up of the words "malicious" and the word "software". It is a malicious program designed to cause damage to the computer.
Types of malware
Malware appears in different ways. Sometimes it infects your PC with a disease, sometimes it spies on you, sometimes it wants your money and sometimes it wants to scare you. To prevent you from being affected by malware, we list different types of malware here and then explain how you can protect yourself against them.
Virus
Firstly, there is the virus. As the name suggests, a virus is a program that copies itself and infects other computers. It is attached to a file or program and only becomes active when the file or program is executed. A virus spreads by passing the file around.
Worm
In addition to a virus, there are also worms. A worm is similar to a virus because it also copies itself. However, the difference between a virus and a worm lies in the way they are infected. A worm is not attached to a file and does not have to be activated to cause damage.
Ransomware
Another type of malware that we've probably all heard of is ransomware. In a ransomware attack, all the data on a computer is encrypted. When a system is infected with ransomware, you can usually recognize it by a text box that appears after all the data has been encrypted. This is because the main feature of ransomware is that a ransom is demanded for the "release" of the data. Once the ransom has been paid, you are supposed to receive a key with which the data can be decrypted. However, there is no guarantee that the attackers will actually hand over the key, even if a ransom has been paid.
Trojans
Another type of malware is a Trojan. A Trojan poses as a harmless program, but performs unwanted actions in the background. For example, a Trojan hides in a cell phone app for a game, which is then downloaded by an unsuspecting user. The Trojan can then carry out actions such as downloading other files or stealing information from the computer.
Spyware
Another type of malware is spyware. The name is made up of the words "spy" and "software". It is self-explanatory what spyware is: It is malware that monitors and records the activities on a computer. This data is then sent to the attacker.
Keylogger
One form of spyware is the keylogger. Its task is to record keystrokes and then send them to the attacker. For example, a password can be recorded, which the attacker can then use later.
Scareware
Another type of malware is scareware. As the name suggests, it attempts to scare the victim. The malware does this by displaying pop-up windows on the screen. These pop-up windows inform you that malware has been found on your device and that you need to buy software to remove it. The trick here is that the software that is supposed to remove the malware is the actual malware. These pop-ups can appear on unsafe websites or in emails.
Botnet
The last malware in this list is the botnet. This is a large number of computers that have been infected by malware and can now carry out actions remotely controlled by the attacker. A botnet can carry out email spam or trigger a DDoS attack.
Protective measures against malware
Now that we have learned about the different types of malware, the question is how systems can be protected so that malware cannot get into your system.
Be careful when clicking on links
One important aspect is that you should not click on just any link, be it a pop-up or a link in an email. You should always first check whether the URL makes sense. This should be done thoroughly, because sometimes only one letter is different. You should also pay attention to which apps or programs are being downloaded. This is because there may also be apps in the Playstore that contain malware. You should therefore only ever download apps and programs from reputable providers.
Uninstall unnecessary programs and apps
Another point is that all programs or apps that are no longer needed should be uninstalled. This is because such programs or apps could be outdated and contain vulnerabilities. These could then be exploited, allowing attackers to gain access to a system.
Physical security of the devices
It is also important to mention that your own mobile devices should not simply be left lying around somewhere. And certainly not unlocked. Otherwise anyone could take your mobile device and, in the worst case, install malware.
Updates and backups
One of the most important points is that software updates should always be installed, as this closes vulnerabilities and thus locks potential doors in the system. An up-to-date backup should also always be created. Because once malware is on a device, it is not unlikely that data will be missing afterwards. With a backup, this can be easily restored.


