Computer viruses are also small pieces of software that attach themselves to real programs.
An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together.
This is also the time in which the virus will try to spread itself onto other programs and even other computers!
Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information.
They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. Some e-mails will ask that you enter even more information, such as your full name, address, phone number, social security number, and credit card number.
However, even if you visit the false website and just enter your username and password, the phisher may be able to gain access to more information by just logging in to you account.
A worm just like a virus is a small piece of software.
However worms rather than relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it’s host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts.
The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999.