Self‑replicates across networks without needing a host file.
Network congestion, rapid consumption of bandwidth.
Trojan Horse
Disguises itself as useful software to trick users into installing it.
Unauthorised remote access, data theft.
Spyware
Collects information about the user’s activities and sends it to a third party.
Unusual ads, changes to browser settings.
Adware
Displays unwanted advertisements, often bundled with free software.
Pop‑up ads, browser redirects.
Ransomware
Encrypts files and demands payment for the decryption key.
Files become inaccessible, ransom note appears.
How Malware Can Enter Through a Downloaded File
Finding a file on an untrusted website or peer‑to‑peer network.
Downloading the file without verifying its source or integrity.
Opening or executing the file, which may contain hidden malicious code.
Malware installs itself, often silently, and begins its payload.
Preventative Actions
Use reputable antivirus/anti‑malware software and keep it updated.
Keep the operating system and all applications patched. Security updates close known vulnerabilities.
Verify the source of a download. Prefer official websites or trusted vendors.
Check file extensions. Beware of double extensions such as document.pdf.exe.
Scan downloaded files before opening. Right‑click → Scan with antivirus.
Enable a firewall. It blocks unauthorised inbound and outbound traffic.
Use strong, unique passwords and two‑factor authentication.
Back up important data regularly. Allows recovery if ransomware strikes.
Educate yourself on phishing techniques. Do not click links or open attachments from unknown senders.
Step‑by‑Step Checklist for Safe Downloading
Identify the need for the file – is it essential?
Locate the file on a trusted website; look for HTTPS and a reputable domain.
Read user reviews or comments about the file, if available.
Download the file to a designated “Downloads” folder.
Before opening, right‑click the file and select “Scan with [antivirus]”.
If the scan is clean, open the file; otherwise, delete it immediately.
After use, consider moving the file to a secure location or deleting it.
Suggested Diagram
Suggested diagram: Flowchart showing the stages of a malware infection from a downloaded file – from source verification, download, scanning, to execution or safe deletion.
Key Take‑aways
Malware includes viruses, worms, trojans, spyware, adware, and ransomware.
Downloaded files are a common infection vector; always verify and scan.
Regular updates, reliable security software, firewalls, and good backup practices dramatically reduce risk.
Awareness and cautious behaviour are the first line of defence.