WORM..
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
TROJAN HORSE..
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
IM WORM..
A worm (a self-replicating program typically designed to perform harm to a computer or network) that propagates over instant messaging applications. The worm spreads by accessing the user's instant messaging address book, or buddy list, and sends itself to individual recipients from that list.
Like a worm that spreads over the Internet, an IM worm can crash a system or allow a malicious hacker to gain access to a user's device. Unlike the traditional form of a worm, an IM worm does not have to scan the Internet looking for vulnerable IP addresses as it spreads by taking names from user address books and identifying who is currently online and therefore vulnerable.
SKULLS..
A type of cellphone virus that deactivates all links to your cellphone applications, including e-mail, IM, and calendar. It replaces all icons on your cellphone with images of skulls.
PROXY TROJAN..
A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use your system to launch malicious attacks against other networks.
RAV MON E VIRUS..
Also called W32/Rjump, this virus is known to open a back door on a computer that runs Microsoft Windows, and then create a copy of itself in the Windows system directory of a computer. It also creates a log file that includes the port number on which the back door component listens. The Rav Mon E virus enables hackers to gain access to the computer's programs and files once it has become infected. If you are using anti-software program that is up-to-date the Rav Mon E virus can usually be detected before it does any damage. This virus is most commonly spread through e-mail attachments, although it can also be spread through portable devices such as multimedia players and digital cameras.
Apple reported that in October of 2006 many of its video iPods had been shipped out with the Rav Mon E virus already installed on them.
SMiSHING..
A compound of 'phishing' and 'SMS'. SMiShing (SMS phishing) is a type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink, which, if clicked would download a Trojan horse to the mobile phone. The term SMiShing was coined by David Rayhawk in a McAfee Avert Labs blog on August 25, 2006.
TUNNELING VIRUS..
A type of virus that attempts installation beneath the antivirus program by directly intercepting the interrupt handlers of the operating system to evade detection.
VIRUS SCANNER..
A type of antivirus program that searches a system for virus signatures that have attached to executable programs and applications such as e-mail clients. A virus scanner can either search all executables when a system is booted or scan a file only when a change is made to the file as viruses will change the data in a file.