PC Threats

PC Threats This page is dedicated to where you can learn about all of the differnt types of threats out there that could possibly infect or damage your computer. Not only have we listed the threats, we have provided a little history on each one so that you may educate yourself on what each one is. Remember to keep your computer protected! Let JBaileyStudio.com help with regular tune-ups and keep your PC protected from all of these threats, they could strike at any moment!


Ransomeware: Ransomware restricts access to data by encrypting files or locking computer screens. It then attempts to extort money from victims by asking for "ransom", usually in form of cryptocurrencies like Bitcoin, in exchange for access to data.

Tech Support Scams:Tech support scams are an industry-wide issue where scammers use scare tactics to trick you into paying for unnecessary technical support services that supposedly fix contrived device, platform, or software problems.

Unwanted Software:Unwanted software are programs that alter your Windows experience without your consent or control. The altered experience can be in the form of modified browsing experience, lack of control over downloads and installation, misleading messages, or unauthorized changes to Windows settings.


Exploits take advantage of weaknesses or "vulnerabilities" in common software, such as Java and Adobe Flash. A vulnerability is like a hole in your software that malware can use to get onto your PC. Malware can use these vulnerabilities to exploit the way the software works and further infect your PC. Some of the worst exploits allow attackers to run malicious code on your PC without your knowledge.

Worm Malware

What are worms?

A worm is a type of malware that spreads to other PCs. Worms can copy themselves and often spread through a PC network by exploiting security vulnerabilities.

How do I get infected with a worm?

Worms can spread through email attachments, instant messaging programs, file-sharing programs, social networking sites, network shares, removable drives, and software vulnerabilities.

Macro Malware

Macros are a legitimate way to automate some common tasks in Microsoft Office. However, malware can also use this functionality to download threats onto your PC. Macro malware usually hides in Microsoft Word or Microsoft Excel documents. These malicious documents are sent as spam email attachments, or inside ZIP files attached to spam emails. They use files names designed to entice you into opening them.


What is a rootkit?

Malware authors use rootkits to hide malware on your PC. Malware hidden by rootkits often monitor, filter, and steal your data or abuse your computer's resources, such as using your PC for bitcoin mining. How do hackers use rootkits?
By using a rootkit, a hacker hopes to protect and maintain their hidden presence on your PC for as long as possible. A successful rootkit can potentially remain in place for years if it is undetected. All this time it will steal information and resources from your PC.

How do rootkits work?

Put simply, some of the things your PC does are intercepted by the rootkit. This means that after a rootkit is installed, you can't trust any information that your PC reports about itself.

For example, if you were to ask your PC to list all of the programs that are running, the rootkit might stealthily remove any programs it doesn't want you to know about. In other words, rootkits are all about hiding things. They want to hide themselves on your PC, and they want to hide malicious activity on your PC.

How common are rootkits?

Many modern malware families use rootkits to try and avoid detection and removal. Rootkits are a lot more common than you may think.


Trojans are the most common type of malware. Unlike viruses, trojans can't spread on their own - they rely on you to run them on your PC by mistake, or visit a hacked or malicious webpage.

A trojan might use the same file name as a real or legitimate app - so you might accidentally download a trojan, thinking you are downloading something else.

They are called trojans because they are like the mythological wooden Trojan Horse that was used to sneak into the ancient city of Troy.

They are often installed with other types of malware, so it's unlikely you'll only get infected with one trojan and nothing else.

How did I get infected with a trojan?

Trojans can't spread by themselves, which means you either downloaded it, thinking it was something else, or another malware downloaded and installed it onto your PC.


Rogue security software is a type of program that pretends to detect and remove malware for a fee.

Rogues claim to scan for malware and then regularly show you fake detections and warnings. They tell you that you need to pay to register the software or remove the fake threats from your PC.

What is the purpose of a rogue?

Rogues have one purpose - to take your money. They tend to be obvious and intrusive. They rely on either:

Convincing you that their reported threats are real.
Being so annoying that you choose to pay the fee.
Rogue security software often copies the look and name of real security scanners, including Microsoft software.

Avoid scams that use the Microsoft name fraudulently

How do rogues work?

Rogues try to scare you into paying a fee, in the hope that the rogue will clean your PC. They need to convince you to pay a fee to be successful.

They usually target you with a lot of deceptive messages coming from their fake software, websites and messages.

Here's what might happen if you have a rogue on your computer:

You see a scanner on your screen, pretending to scan your computer- it might appear as you browse the Internet or you might have inadvertently downloaded it. After the scan is complete you are shown a large number of malware infections that were supposedly found on your PC. You keep seeing warnings about these supposed malware infections in messages and alerts popping up on your desktop or coming from the taskbar. The rogue stops you form launching other programs and instead shows you an alert that the program is also infected. Trying to download updates or tools from legitimate security sites might have the same result. Rogues usually target system security and firewall applications. They try to shut them down and modify their registry entries to make it extremely difficult to remove the fake scanner from your PC.


Backdoor:Java/Adwind is a Java archive (.JAR) file that drops a malicious component onto the machines and runs as a backdoor. When active, it is capable of stealing user information and may also be used to distribute other malware.


Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.

"Spyware" is mostly classified into four types: adware, system monitors, tracking cookies, and trojans; examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons.


Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money) , often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.