Software that attempts to cause damage on a computer. This can include the interception of communications, the theft or destruction of data or the manipulation of an e-banking transaction.
Attackers use various channels to try to infect third-party computers with malware. The infection often occurs via a file attachment in an email, hidden in a free download or when visiting a website. Nowadays, malware is usually multifunctional and often has the ability to download further malware. This opens up numerous possibilities for attackers. Unfortunately, it is not so easy to detect an infection. Signs include a slower system or increased network traffic, for example.