Call back

Malware Trends

Free «Malware Trends» Essay Sample


1.1 Research Background

People use computers for multiple purposes. For example, they do business, buy products and services, communicate, browse social networks, look for information, watch videos, carry out transactions, and many others with the help of computers. However, all these actions face the risk of infecting PCs with numerous types of malware. Therefore, it is essential to identify the risk as soon as possible and to remove it before it causes serious harm.

Malicious software or malware is usually defined as any software that disrupts computer operation, gathers sensitive information or gains access to private computer systems (“Malware,” 2015). Hence, it has malicious intent and acts against the PC user’s requirements. Some malware aims at stealing information, spying, or causing harm. The term is used to refer to different types of hostile software taking the form of scripts, executable code, active content, etc.

The use of malicious software has undergone an evolution, diversification, and maturation in terms of attacks and fraud schemes facilitated. Nowadays, malware is more and more often treated as a commodity. Research indicates that the industry of cybercrime is prospering and is able to adapt to the advances in security technologies. A disruptive security approach addressing the root cause of infections and cybercrime is needed (Sikorski & Honig, 2012). Malware poses a very dangerous threat to companies, organizations, enterprises, end users, and financial institutions. The havoc that malware has the potential to wreak has resulted in improved technologies that aim to detect and prevent malware from infecting computers (Aquilina, Casey, & Malin, 2008). In turn, this has encouraged cyber criminals to evolve their own technologies to stay ahead of security vendors.


Title of your paper
Type of assignment
Number of pages
Academic Level

Malware costs businesses billions of dollars a year. It poses a threat to businesses, enterprises, infrastructure and personal security all around the whole world. Malware may be attached to the programs supplied by companies. For example, it can be downloaded from websites that seem to be useful and attractive, but contain a hidden tracking functionality (Sikorski & Honig, 2012).

For many years, infectious programs were written for the sake of experiments. Nowadays, malware is mostly used to steal information or cause harm. However, it is also used to gather personal information, including bank and credit card numbers, passwords, personal identification numbers, and others (Ligh, Adair, Hartstein, & Richard, 2010). Some malware is designed to generate money when computer users click an advertising link. Hence, malware is used for criminal purposes. In many cases, perpetrators do not get a direct benefit (Suarez-Tangil, Tapiador, Peris-Lopez, & Ribagorda, 2013). The most common software used to protect against malicious activity and recover from malicious attacks include firewalls, anti-virus and anti-malware.

Rapid development of the Interned has made malicious software become profitable. Since 2003, viruses have been designed to control computers. However, email spam has been sent to host contraband data. Modern malware is different from the earliest one (Landesman, 2007). Most malware reports come from the USA. The country is a huge contributor to malicious IPs. Moreover, the USA reports the greatest number of cyber attacks and threat data (King, 2012). Malware infects systems that are installed by exploiting any software attached as macros to files or bundled with other programs. It only requires users to visit a website infecting computers. In many cases, they are simply installed by clicking on an attachment or downloading a file. But malware is not able to cause physical damage to the hardware of systems and network equipment. It only damages the software and data.

In many cases, people take rutine things for granted. For examples, they sinly rely on computers, the Internet, iPhones, mobile phones, etc. due to their usefulness, entertainment, and simplification of tasks, research, and communication opportunities. People who lack knowledge related to the modern cyber threats, do not see any dangers of using the Internet connection (Aquilina, Casey, & Malin, 2008). Dangers may remain undetected for many years untill the damage becomes evident. Hence, education and prevention is much easier than recovery and cleaning up the infected computer system. Thus, to protects personal information, sensitive data, business information and increase security, people should become more aware of the exiting malware, their trends, ways the malware is transmited, and solutions in case the computer is infected. It is also essential to take measures to prevent malware-related threats as well as keep the data safe and secure.

1.2 Research Aims and Objectives

People realize that in the modern world computer security is of vital importance. Nowadays, the security industry is experiencing an increased demand due to the challenges associated with security threats (Ligh et al., 2010). The primary goal of cyber criminals is to create undetectable malware. This means that the program works quietly on a computer, gathering and recording sensitive information. It is usually controlled remotely.

Benefit from Our Service: Save 25% Along with the first order offer - 15% discount, you save extra 10% since we provide 300 words/page instead of 275 words/page

Order now

A malware infection influences the usual functioning of a computer. In case of infection, the machine displays numerous error messages, slows down, refuses to shut down, crashes, restarts, sends emails from the user’s name, or displays web pages you did not want to visit. In addition, the malware installs new toolbars, icons, makes changes in the Internet home page, etc. (Sikorski & Honig, 2012).

The aim of the research is to understand malware trends. The research will discuss the history of malware and malware types and suggest best practices for solving malware-related problems. The research objectives are as follows:

  • to analyze the history of malware in the USA
  • to investigate the types of existing malware
  • to examine organizations engaged in tracking malware
  • to discuss the future of malware
  • to analyze best practices and recommend effective solutions

Nowadays, the field of malicious software is one of the most active and challenging ones in the sphere of computer security. Anti-virus vendors have notices an extremely rapid increase in the number of malware samples (Microsoft security intelligence report, 2009). Therefore, it is essential to analyze them, learn about malware trends and find ways to avoid them.

1.3 Research Questions

Rapid development of the Internet and technologies makes malware extremely aggressive and evasive. Evasive malware thwarts traditional security technologies. Creators of modern malware make an increased focus on improvement of security technologies and make their programs resistant to them (Suarez-Tangil et al., 2013). In order to meet the research objectives, the following questions should be addressed:

  • What are the modern trends of malware?
  • Have the types of malware changed in terms of their goals and ability to cause damage?
  • What can organizations do to help solve the problems caused by malware?
  • What are the best solutions to prevent malware?

1.4 Research Outline

Chapter 1: Introduction. The chapter begins with some background information on malware, provides an overview of the research, research aims, purpose, and objectives as well as research questions.

Chapter 2: History of Malware. The chapter investigates the malware history in the USA. It discusses the first viruses, the way they were created and tracks them till present days.

Chapter 3: Types of Malware. The chapter discusses different types of malware such as viruses, worms, adware, spyware, and others. In addition, it analyzes the ways the different types of malware enter computers and the threats they pose.

Chapter 4: Organizations Tracking Malware. The chapter provides an analysis of OWASP, ThreatTrack Security, and Symantec Symantec.

Chapter 5: Future of Malware. The chapter analyzes the future trends and threats of malware.

Chapter 6: Best Practices and Solutions. The chapter offers ways to avoid damage presented by malware.

Chapter 7: Conclusions. This chapter will provide conclusions based on the research findings.

2. History of Malware

Malware has come a long way since its appearance. It has evolved from the days of floppy disks and became widespread with the rapid development of the Internet. The tactics and techniques of innovative attacks have increased over the years. It has made the defenders of computing systems more aware of the malware developers’ tricks used to infect systems (Suarez-Tangil et al., 2013). At the same time, malware authors have also developed new infection approaches for modern operating systems. Moreover, they have been looking for ways to make their nets wider to infect several types of machines and multiple operating systems simultaneously.

Top 30

Get the most experienced writer in the relevant discipline!

Hire a TOP writer for $10.95

Malware has a long history that began in 1949 (first theorization). The first computer worms were mentioned in 1975 by John Brunner. Three years later, John Shock and Jon Hepps created the first computer worm. They wrote different versions aimed to improve efficiency of computers. However, the bug crashed them (“The early days. History of malware,” 2015). The first viruses were found in universities via infected floppy disks (e.g. the Morris worm, Brain, Stoned, Lehigh, Michelangelo, and others). Morris Worm was created in 1987. It aimed at destroying files on Fridays 13th. The worm spread quickly around the world, being the first worm to spread via the Internet. At that time, the first Macintosh viruses were designed in the form of Peace and nVir. As a result, Apple loaded the virus search program called Virus-Rx (“The early days,” 2015). In 1988, Robert Morris released another worm. Its intent was rather experimental than malicious. The creators of the earliest worms and viruses did not intend to cause harm. The Creeper Virus was created in 1971 (Suarez-Tangil et al., 2013). The virus was also an experiment and did not intend to cause damage. It initiated the appearance of the first anti-virus program called Reaper.

The first Trojan was released in 1978. It was called ANIMAL and did not damage the system. It worked to spread through networks and copies. In three years, Elk Cloner was developed for the Apple II. Despite the existence of numerous viruses, the term was first used in relation to computer programs only in 1983. In December 1987, an American student performed email communication infecting networks around the globe with the first computer worm called “Christmas tree” (“The early days,” 2015).


VIP support services: extra attention is guaranteed!

Hire a VIP support for $9.99

The release of malware such as the Melissa worm, the Happy99 virus, and Kak worm occurred in 1999. All of them spread through Microsoft environments. The next year was favorable for the creation of a LOVEYOU worm. The worms like Nimda, Santy, Estonia, Conficker, Stuxnet, and Zappos were released during the following years (“The history of malware,” 2015). Since 1990s, there has been a rapid increase in the use of personal computers. Numerous households had those devices. The Internet has become an inevitable part of everyday life of most people (“A history of malware: Part one, 1949-1988,” 2015). In the 1990s, businesses began to be impacted by macro viruses (e.g. CIH known as Chernobyl or Spacefiller, DMV or digital mode virus, etc.). By the second part of the 1990s, viruses could commonly be found in home computers (e.g. Kak and Melissa) (Suarez-Tangil et al., 2013).

Since the 2000s, worms have begun to spread worldwide (e.g. Magistr, Loveletter, and others). In 2001, Anna Kournikova virus was created. It was spread by sending emails to contacts in the address book of Microsoft Outlook. At that time, many new threats appeared in the world. For examples, the Sadmind worm, the Sircam worm, the Code Red worm, the Nimda worm, the Klez worm, and many others (“The early days,” 2015).

The Smile virus, Beast, Mylife, and Optix Pro were created the following year. From 2003 up till now, a great number of malware has been created to get sensitive information and assist cybercrimes (“The history of malware,” 2015). The most spread viruses that appeared during that time period are Graybird, the Blaster worm, Swen, the MyDoom, the Sasser worm, Santy, the Zlob Trojan, Zeus, the Saprosy worm, etc. Starting in 2010, anti-malware programs were introduced. However, they were a form of malware themselves. Over the last decades, malware has undergone substantial development and improvement. It has become extremely difficult to detect some threats. Therefore, the world experiences a tremendous rise in malware-related problems (“The early days,” 2015).

Affiliate Program: Earn 10%

from all orders made by people you bring.

Your people also get 17% discount for their first order.

It may be concluded that malware has undergone a long way of their development. They have improved and became adaptable to modern applications and devices. As a result, there is an increased need in their analysis and investigation.

3. Types of Malware

There are numerous types of malware floating around the Internet. Many of them date back to the early years of their creation. After they are triggered, it is extremely difficult to completely remove them. All types of malware have one common thing, that is the infiltration of a computer system without the user’s awareness (Suarez-Tangil et al., 2013).

There are many different types of malware distinguished by the way they spread. Many malicious programs defend themselves against removal or are able to hide themselves. Infectious malware includes worms, viruses, Trojans, spyware, adware, Zombie, Uapush.A and others. There are many malware pieces that do not pose a real danger. Some of them simply annoy computer users with continuous advertising, providing links or changing a user’s home page. However, some malware may pose a real threat and the user may experience the consequences for a long time.

3.1 Virus

A virus is able to take control over computer functions, destroy data, and steal personal information, including passwords, numbers of credit cards, etc. It modifies, deletes or corrupts the files. A virus can relay a spam email, coordinate attacks or even spread pornography. It is usually spread through the Internet, a network, and removable media. A virus is malware that is unable to spread from one computer to another without help. Early viruses were spread by passing floppy disks from one machine to another. Nowadays, they spread by sharing infected files or email with colleagues, friends, family and other people over a network (Szor, 2005).

5 % off

For more than

30 pages
10 % off

For more than

50 pages
15 % off

For more than

100 pages

A virus is attached to a program that spreads the virus while running. Therefore, it requires a user run the infected program for the virus to spread (Swain, 2009). Users should know that almost all viruses are usually attached to an executable file. It means that the virus may exist on a computer causing no harm to it unless the user runs the malicious program.

As soon as the machine is infected, it can be used for different purposes (Peterson, 2006). Thus, viruses can erase files, steal intellectual property, crash the system, take the user’s computer hostage until he/she pays a fee, steal personal identity information, and others. Morover, they have different complexities that enable their modification to avoid detection by antivirus software.

Viruses are classified into different types, such as macro viruses, file viruses, multipartite viruses, master boot record viruses, polymorphic viruses, boot sector viruses, and stealth viruses. There are such viruses as Accept.3773, W32.Sfc!mod, ABAP.Rivpas.A, and many others (Szor, 2005). A password protected .zip file is considered to be one of the most clever viruses because traditional anti-virus software has difficulties detecting it (“What are viruses, worms, and Trojan horses?” 2014).

Macro viruses infect Word, Excel, PowerPoint and other data files. Reparation is considered to be a difficult process. File viruses infect program files staying in memory and harm programs loaded to the memory. Multipartite viruses infect program files during the execution of the infected program. Master boot record viruses reside in memory. They self-copy themselves to the first storage device sector, which is usually used for the OS loading programs. The virus infects particular areas and may be removed through cleaning. A polymorphic virus encrypts its code in different ways and is difficult to detect. A boot sector virus infects the HDD or FDD boot sector and resides in memory. Once the computer starts, a boot sector infects it. It is very difficult to clean this virus type. A stealth virus uses different techniques to prevent detection. It redirects the disk head to read another sector or alters the reading of the infected file’s size (Swain, 2009).

Attractive plagiarism check
option: ensure your papers
are authentic!


3.2 Worm

A worm is a stand-alone malware program that spreads over a network, infacting computers. Unlike a virus, it spreads itself and does not require any user’s actions. A worm replicates over a network and spreas via email and delivers viruses. However, the terms ‘worm’ and ‘virus’ are often interchangeable (“What are viruses,” 2014). Worms are considered to be programs that are able to undergo an automated self-replication. They are easily spread across networks. A worm usually takes security flaw advantage to install itself on a host PC. When it is installed, it scans the network, searching the machines that have the same security flaw. This method helps to create increased propagation in just several hours (Swain, 2009).

3.3 Spyware

The spyware type of malware collects valuable personal information and sends it to the interested parties. Spyware applications tend to monitor the infected computer. They usually spread in the same way as Trojans. Spyware are not able to automatically replicate. However, they exploit computers for commercial advantages. They can collect private information and send the data to a person interested in it. Some applications of spyware borrow features from adware, redirecting webpages to advertising websites.

Spyware can come from a variety of sources. However, it mainly gets on devices through deception. Another spyware infection source is shareware or freeware software. It is known as an un-patched operating system that lacks the latest security software . In general, spyware is not an illegal software type in case a user knows the type of data collected and the people to whom they are shared. The greatest problem is that most users are unaware of what is happening on their devices.


Absolute Confidentiality

Our company never discloses clients’ personal information to anyone.


Original Papers

Every paper is protected against plagiarism by specialized plagiarism detection software.


Timely Delivery to Beat any Deadline

Simply put, we do not miss deadlines even the tightest ones.


24/7 Customer Support

Whenever questions arise, feel free to get in touch with us during day and night.

Buy Essays Online from Us to Resolve Your Academic Challenges

Cannot write an ordinary essay or a complex thesis or dissertation by yourself? Do not worry since we have online solutions for every client. We are the most credible writing company where you can order an academic paper of any type. Whether you want to buy essays online, short-answer questions assignments, reaction papers, book reports, or any other projects, contact our academic writing agency. We know that students often face tough challenges through the academic years and want to help them ease their burden.


It is no secret that students are obliged to submit numerous writing tasks, which are a part of their educational curriculum. If you are one of those students who experience troubles while creating memos, research papers, concept maps and other pieces of writing, you may become extremely worried about the outcome, especially if the deadline is fast-approaching and instructions are perplexing. Our professional essay writers can help you handle your assignments and improve your final grades. So, do not hesitate to ask us for writing assistance.

We are here to help those desperate students who would like to get a perfectly written term paper, dissertation chapter, synopsis, grant proposal or any other work with completely authentic content. We do understand that the submission of plagiarized academic writing projects may lead to negative consequences such as unsatisfactory grades or even suspension from an educational establishment. In case you do not know how to create original content, order custom essays online from us. The qualified and professional essay writers comprising our team are experts in producing authentic texts. They always write papers from scratch and make proper citations, which means top-notch academic writing material is guaranteed. Thus, buy essay paper writing at if you desire to receive impeccable projects.


Title of your paper
Type of assignment
Number of pages
Academic Level

Buy Essay Paper Writing and Enjoy a Variety of Services Offered

Since students are assigned the tasks and projects of diverse nature, they strive to find the online company that can provide them with not only an essay writing service but also a spectrum of others that could help them cope with their assignments. is the company that offers a broad range of professional essay services. Some of them are listed below:

  • Professional essay editing. You have produced your custom essay but you are unsure whether it is correct in terms of sentence construction, clarity of text, etc. No problem! Submit your essay online to us and expect to be delivered a flawless work.
  • Valuable rewriting. We can reword any type of text. Thus, do not delay submitting your paper to us. Be confident that the rewritten document will be focused on the same topic and deliver the same messages as the original one.
  • Great formatting. Whether you buy essays online from us or the papers of other kinds, be certain that the citation style indicated in the order form will be applied correctly. We are conversant with all formats.
  • Remarkable proofreading. If you hesitate about being able to correct all punctuation errors, misspelled words, typos, etc. in your piece of writing, hire our proofreaders. They can easily spot all mistakes and correct them.

Regardless of the custom essay service you intend to use, you can be confident tha the final output will be outstanding since we are the experts focused on superb results. We realize that education matters a lot to you and it is not always easy to reach the objectives which you have defined for yourself. However, our custom essay writing team is here to assist you in the best way possible. So, do not panic if you don’t have a clue about how to create a powerful custom essay. Instead, turn to us to use our remarkable essay writing service.

Huge Discounts for Loyal Customers Who Regularly Order Custom Essays Online from Us


For more than

30 pages



For more than

50 pages



For more than

100 pages


Continue placing orders on our website and you will be provided with generous discounts for your loyalty. The discount rate depends on the number of pages ordered. The increasing number of orders presumes the rise of discounts from 5% to 15%. For example, if you buy 30 pages in total, you will receive a 5% discount on the future orders. In case you purchase 50 pages in total, you will get an opportunity of receiving a 10% discount on your next orders. When your assignments total 100 pages, you will be offered a 15% discount on the next orders. The most interesting fact is that such type of discount is called “life-time” and you will have an opportunity to use it as much as you need. Try our essay writing service now!

Why Should I Order an Essay from Your Website?

Have you ever thought about the cases when you cannot cope with a huge amount of home tasks and numerous academic papers that have to be written within a short time frame, whereas some other students get the best grades with ease? It is no longer a secret – they use online essay writing services and do not spend even a minute on writing boring essays and research papers.

When using a valuable academic writing service, one gets a wonderful opportunity to have some free time and manage it in their own way. Students get a chance to devote their attention to something other than studies. For example, they can take up a new hobby, try the kind of sports they have been dreaming of, enhance their personal development, etc. A worthy essay writing service is a great tool for those who want to make their academic life easier and more interesting. With a superb service at hand, students may stop bothering about the constant need of doing endless assignments, lab experiments, tests, etc.

If you also want to save your time and efforts just like other students in your class, make an order on our website and get numerous advantages:

Your paper will be assigned to the best writer, who specializes in your subject. It means that an expert writing specialist will complete your assignment according to your demands, so that you can get the desired grade.

You will have 48 hours (1-19 pages) or 30 days (20+ pages) for a free revision if you think that some requirements have not been followed by the writer. Please remember that this option requires keeping initial guidelines the same.

If you buy an essay online from our agency, be confident it will belong to you only. We never resell our clients’ orders as we value both their trust in us and our reputation. So, full ownership is granted!

On our website, you can buy essay papers at attractive prices that won’t hurt your budget. Just access our “Prices” page to see what rates we charge for different types of papers. Y0u can even determine the cost of your work before ordering it.


Use discount code first15 and

Get 15% OFF Your First Order!


Advantages of Cooperating with Our Professional Essay Writers

The question “Where to buy essays online?” is acute for a large number of students who cannot handle their assigned projects on their own. You have to be careful while choosing an agency to buy an essay paper online from, especially when it goes about some unknown online writing companies. There are more and more fraudulent providers on the Internet and students often become their victims by investing money into their scam services.

However, our company is known for providing a remarkable essay writing service. We have a big client base and we receive a lot of positive feedback on our work. We know how to satisfy customers’ demands and deliver superior quality services to every student.

If you buy an essay paper or that of any other kind from our online writing company, be certain that your professor will not even assume that it was written by another person. By using the writing service offered by our agency, you can confident of receiving a genuine paper written according to your specifications. You will not find a similar paper on the web, we guarantee!

One of the most important aspects to consider when choosing us to buy an essay online is our writers. We have a very strict hiring process since we want our writing team to comprise only highly knowledgeable and experienced specialists. We employ only the best writers on the writing market. Whenever you buy an essay or a complex dissertation, we will find the most suitable writer to accomplish your writing task.

We employ only professional essay writers who are degree holders and are able to take into consideration all customers’ needs. Here is a list of benefits you can gain if you hire one of our experts to write an essay online for you.

  • Your writer will carry out detailed research on your topic and gather all appropriate materials to make sure that your topic is covered fully.
  • The assigned expert will carefully analyze the collected data and determine the order of presenting it.
  • The specialist working on your assignment will structure it coherently so that it looks visually attractive and is easy to read.
  • Your writer will complete the given task according to the indicated citation style. Therefore, you no longer need to spend hours reading rules of formatting not to lose points for the paper.
  • If you buy essay papers on our website, have no doubts that it will contain all the required visual material, i.e. charts, tables, diagrams, etc.

If you want to write an essay or research paper on your own, you will have to spend many hours in the library and browse numerous online databases to find appropriate materials. However, our professional essay writers can do everything more effectively and according to the indicated deadline. So, buy essay assignments from us to ease your academic workload. You only have to place an online order.


Simple Ordering Process: Buy Essay Assignments with Ease!


Submityour paper details


Payfor the order


Downloadyour paper


Only a Few Clicks to Buy Essay Writing of Top Quality

The process of using our essay writing service is indeed rather simple. It requires our customers, who want to order an essay online from, to fill out a comprehensible form and that’s all. So, to buy essay paper writing from us, you need to:

  1. Provide broad guidelines about how to deal with your assignment. Indicate the deadline, topic, number of words, spacing, citation style, etc.
  2. Pay for your assignment. We offer several reliable payment methods which you can use to buy an essay online from us. Once the transaction is verified, your assignment will appear in our system.
  3. Communicate with your expert if required. We have created an effective system for online communication between our clients and writers. So, you can always send your specialist a message if such a need arises.
  4. Download your completed paper. Once your deadline expires, your assignment will be uploaded to your account at Additionally, the copy of your completed project will be sent to your email.

So, why waste your time if you can order an essay from us and forget your worries and troubles? Our academic writing team is always ready to assist you in overcoming your academic difficulties. Thus, feel free to use our essay writing service to achieve the desired success!

Use disount code first15 and
Place your order now
Online - please click here to chat

Coherent Cookies Policy: our aim is customer satisfaction! We guarantee complete security, fully customized content and perfect services. Read more »

It’s Ok