Malware has been a threat to individuals and organizations since the beginning of the 1970s when the Creeper virus first appeared. Since then, our planet has been under fire from thousands of different ​malicious software​(malware​)​ variants, all with the intent of causing the foremost disruption and damage as possible. Malware does not physically damage the hardware.

Malware has found several methods of attack. They include email attachments, malicious advertisements on popular sites (malvertising), fake software installations, infected USB drives, infected apps, phishing emails, and even text messages.

Malware ​comprises of all types of malicious software, including viruses, and cybercriminals use it for many reasons, such as:

  1. For financial gain, where it leads to the user of the code to gain money through stealing, scamming, advertising, or ransoming
  2. For intellectual gain, which leads to the release of information (such as passwords, blackmail, or top-secret info) to the user of the malware or the public
  3. For someone to see their capabilities by watching how far their code can go

white hat and Black hat hackers

Please note all hackers are not malicious. Hackers use their skills to help protect against attacks are called “white hat hackers”.White hat hackers work to proactively find security weaknesses in order to fix them before they can be exploited by attacks.  ​Those hackers looking to take down networks steal data, or compromise systems are called “black hat.”  These are the bad guys, who break into networks or computers or create computer viruses.
There are other bad guys like Script Kiddies, Spy Hackers, Cyber Terrorists and Hacktivists