Comprehensive Overview of Computer Virus Types in 8 Minutes
An 8-minute explanation of various well-known computer virus types. Join the Discord community to discuss this video: https://discord.gg/yj7KAs33hw. Don't forget to subscribe and activate notifications.

The Paint Explainer
1.9M views • Apr 1, 2024

About this video
Every famous type of PC virus gets explained in 8 minutes!
Join my Discord to discuss this video:
https://discord.gg/yj7KAs33hw
Subscribe and activate the bell!
💼 Business Mail: operamp4@gmail.com
— TIMESTAMPS —
0:00 Malware
0:17 Virus
0:51 Worm
1:28 Trojan
1:59 Malvertising
2:27 RAT
2:44 Backdoor
3:00 Rootkit
3:36 Spyware
3:53 Keylogger
4:07 Ransomware
4:28 Fileless Malware
4:49 Adware
5:09 RAM Scraper
5:19 DDoS Attack
5:44 Browser Hijacking
6:11 Cryptojacking
6:29 Rogue Security Software
6:42 Phishing
7:09 Hybrid Malware
7:22 Brute Force Attack
7:47 Wiper
7:57 Social Engineering
— SOURCES —
https://en.wikipedia.org/wiki/Malware
https://en.wikipedia.org/wiki/Computer_virus
https://en.wikipedia.org/wiki/Computer_worm
https://en.wikipedia.org/wiki/Trojan_horse_(computing)
https://www.techtarget.com/searchsecurity/definition/rootkit
https://en.wikipedia.org/wiki/Rootkit
https://www.malwarebytes.com/backdoor
https://en.wikipedia.org/wiki/Keystroke_logging
https://www.malwarebytes.com/keylogger
https://en.wikipedia.org/wiki/Spyware
https://www.malwarebytes.com/spyware
https://en.wikipedia.org/wiki/Ransomware
https://en.wikipedia.org/wiki/Fileless_malware
https://en.wikipedia.org/wiki/Adware
https://en.wikipedia.org/wiki/Memory-scraping_malware
https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-remote-access-trojan/#:~:text=Learn%20More-,What%20is%20Remote%20Access%20Trojan%20(RAT)%3F,Report%20Demo%20Endpoint%20RAT%20Protection
https://en.wikipedia.org/wiki/Malvertising
https://en.wikipedia.org/wiki/Denial-of-service_attack
https://en.wikipedia.org/wiki/Browser_hijacking
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Rogue_security_software
https://en.wikipedia.org/wiki/Phishing
https://en.wikipedia.org/wiki/Brute-force_attack#:~:text=In%20cryptography%2C%20a%20brute%2Dforce,the%20correct%20one%20is%20found.
https://en.wikipedia.org/wiki/Wiper_(malware)#:~:text=In%20computer%20security%2C%20a%20wiper,maliciously%20deleting%20data%20and%20programs.
https://en.wikipedia.org/wiki/Social_engineering_(security)
— DISCLAIMER —
Do not use this video as your only source of information. This video is for entertainment/edutainment purposes, and some information could be too oversimplified or incorrect. This channel's goal is to spark your curiosity and let you do your own research on these topics. I'm not a cybersecurity expert.
Join my Discord to discuss this video:
https://discord.gg/yj7KAs33hw
Subscribe and activate the bell!
💼 Business Mail: operamp4@gmail.com
— TIMESTAMPS —
0:00 Malware
0:17 Virus
0:51 Worm
1:28 Trojan
1:59 Malvertising
2:27 RAT
2:44 Backdoor
3:00 Rootkit
3:36 Spyware
3:53 Keylogger
4:07 Ransomware
4:28 Fileless Malware
4:49 Adware
5:09 RAM Scraper
5:19 DDoS Attack
5:44 Browser Hijacking
6:11 Cryptojacking
6:29 Rogue Security Software
6:42 Phishing
7:09 Hybrid Malware
7:22 Brute Force Attack
7:47 Wiper
7:57 Social Engineering
— SOURCES —
https://en.wikipedia.org/wiki/Malware
https://en.wikipedia.org/wiki/Computer_virus
https://en.wikipedia.org/wiki/Computer_worm
https://en.wikipedia.org/wiki/Trojan_horse_(computing)
https://www.techtarget.com/searchsecurity/definition/rootkit
https://en.wikipedia.org/wiki/Rootkit
https://www.malwarebytes.com/backdoor
https://en.wikipedia.org/wiki/Keystroke_logging
https://www.malwarebytes.com/keylogger
https://en.wikipedia.org/wiki/Spyware
https://www.malwarebytes.com/spyware
https://en.wikipedia.org/wiki/Ransomware
https://en.wikipedia.org/wiki/Fileless_malware
https://en.wikipedia.org/wiki/Adware
https://en.wikipedia.org/wiki/Memory-scraping_malware
https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-remote-access-trojan/#:~:text=Learn%20More-,What%20is%20Remote%20Access%20Trojan%20(RAT)%3F,Report%20Demo%20Endpoint%20RAT%20Protection
https://en.wikipedia.org/wiki/Malvertising
https://en.wikipedia.org/wiki/Denial-of-service_attack
https://en.wikipedia.org/wiki/Browser_hijacking
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Rogue_security_software
https://en.wikipedia.org/wiki/Phishing
https://en.wikipedia.org/wiki/Brute-force_attack#:~:text=In%20cryptography%2C%20a%20brute%2Dforce,the%20correct%20one%20is%20found.
https://en.wikipedia.org/wiki/Wiper_(malware)#:~:text=In%20computer%20security%2C%20a%20wiper,maliciously%20deleting%20data%20and%20programs.
https://en.wikipedia.org/wiki/Social_engineering_(security)
— DISCLAIMER —
Do not use this video as your only source of information. This video is for entertainment/edutainment purposes, and some information could be too oversimplified or incorrect. This channel's goal is to spark your curiosity and let you do your own research on these topics. I'm not a cybersecurity expert.
Video Information
Views
1.9M
Likes
63.3K
Duration
8:21
Published
Apr 1, 2024
User Reviews
4.8
(376) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now