Download MalwareBytes! Stop viewing porn! Stop pirating! Satan knows!


Viruses

These programs are designed to replicate themselves throughout the computer hardware. This may include making multiple copies of themselves, replacing critical system files with copies of themselves, or a mixture of both.

Spyware

These programs are designed with the sole purpose of allowing the creator to spy on the victim. This may include collecting system files, the use of cookies, tapping into input devices, and even taking control of the computer entirely

Ransomware

A more recent form of computer viruses, these programs are designed to put your computer hostage until an end goal is met. Most of the time, they encrypt files using a random key generator and demand money. Just one more reason to backup your files

Browser hijacker

Ever downloaded a program only to find that your homepage was replaced and you now have a useless toolbar? That is a browser hijacker. For the most part, these can be avoided so long as you read what you're agreeing to when installing software. Especially if the installer is from a third party website like Softonic.

Torjans

Not to be confused with the popular choice for condoms, these programs gets their name because they're designed to disguise themselves as desirable applications. A popular varient of these are Rogue Software; fake antiviruses that install spyware and plague the users with fake warnings about their system being infected.

Malware

A more serious computer viruses that require a special anti-malware program to remove.

Adware

Programs designed to annoy the users with popups and advertisements


glitchesParamount