{"id":342579,"date":"2024-11-05T21:52:31","date_gmt":"2024-11-05T20:52:31","guid":{"rendered":"https:\/\/sauldie.org\/de\/malware-definition-gefahren-schutz\/"},"modified":"2024-11-05T21:52:31","modified_gmt":"2024-11-05T20:52:31","slug":"malware-definition-danger-protection","status":"publish","type":"post","link":"https:\/\/risawave.org\/en\/malware-definition-gefahren-schutz\/","title":{"rendered":"Malware (Glossary)"},"content":{"rendered":"<p>The term malware belongs in the fields of cybercrime and cybersecurity, as well as digital society. Malware is short for \u201emalicious software.\u201c It describes programmes that are secretly installed on computers, tablets, or smartphones to cause damage or steal data.<\/p>\n<p>Malware can get onto a device, for example, as an email attachment, via fake websites, or by downloading unsafe apps. A typical example is the so-called \u201evirus\u201c attack: a user opens an attachment in a deceptively real email, unaware that it contains malicious software. As soon as the file is opened, the malware infects the device, can collect data, and spread further unnoticed.<\/p>\n<p>The consequences of malware are diverse: passwords, personal data, or even company secrets can be stolen, computers can be rendered unusable, or hackers can extort money for the release of blocked data. Malware is therefore one of the biggest threats to digital security \u2013 for both private individuals and businesses. Regular updates, strong passwords, and conscious handling of unknown links and attachments offer protection.<\/p>","protected":false},"excerpt":{"rendered":"<p>Der Begriff Malware geh\u00f6rt in die Bereiche Cyberkriminalit\u00e4t und Cybersecurity sowie Digitale Gesellschaft. Malware ist die Abk\u00fcrzung f\u00fcr &#8222;Malicious Software&#8220; \u2013 auf Deutsch &#8222;b\u00f6sartige Software&#8220;. Damit werden Programme beschrieben, die heimlich auf Computern, Tablets oder Smartphones installiert werden, um Schaden anzurichten oder Daten zu stehlen. Malware kann zum Beispiel als Anhang in einer E-Mail, \u00fcber &#8230; <a title=\"Malware (Glossary)\" class=\"read-more\" href=\"https:\/\/risawave.org\/en\/malware-definition-gefahren-schutz\/\" aria-label=\"Read more about Malware (Glossar)\">Read more<\/a><\/p>","protected":false},"author":2,"featured_media":342578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ef_editorial_meta_date_first-draft-date":"","_ef_editorial_meta_paragraph_assignment":"","_ef_editorial_meta_checkbox_needs-photo":"","_ef_editorial_meta_number_word-count":"","footnotes":""},"categories":[65,26,135,28,1274],"tags":[247,69,1270,1271,1272],"class_list":["post-342579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberkriminalitaet-cybersecurity","category-automatisierung","category-experte-fuer-digitale-gesellschaft","category-digitale-transformation","category-kuenstliche-intelligenz-glossar","tag-3ddruck","tag-innovationdurchachtsamkeit","tag-kostenersparnis","tag-lieferkette","tag-wertschoepfung","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-25"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malware<\/title>\n<meta name=\"description\" content=\"Was ist Malware? Erfahren Sie, wie Malware entsteht und wie Sie sich effektiv davor sch\u00fctzen k\u00f6nnen \u2013 jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/risawave.org\/en\/malware-definition-danger-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware (Glossar)\" \/>\n<meta property=\"og:description\" content=\"Malware (Glossar) - - risawave.org\" \/>\n<meta property=\"og:url\" content=\"https:\/\/risawave.org\/en\/malware-definition-danger-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"risawave.org\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-05T20:52:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sanjay Sauldie (M.Sc.)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sanjay Sauldie (M.Sc.)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/\"},\"author\":{\"name\":\"Sanjay Sauldie (M.Sc.)\",\"@id\":\"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4\"},\"headline\":\"Malware (Glossar)\",\"datePublished\":\"2024-11-05T20:52:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/\"},\"wordCount\":192,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/risawave.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg\",\"keywords\":[\"#3DDruck\",\"#InnovationDurchAchtsamkeit\",\"#Kostenersparnis\",\"#Lieferkette\",\"#Wertsch\u00f6pfung\"],\"articleSection\":[\"Cyberkriminalit\u00e4t und Cybersecurity\",\"Automatisierung\",\"Digitale Gesellschaft\",\"Digitale Transformation\",\"KI Glossar\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#respond\"]}],\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\/\/risawave.org\/en\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/\",\"url\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/\",\"name\":\"Malware\",\"isPartOf\":{\"@id\":\"https:\/\/risawave.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg\",\"datePublished\":\"2024-11-05T20:52:31+00:00\",\"description\":\"Was ist Malware? Erfahren Sie, wie Malware entsteht und wie Sie sich effektiv davor sch\u00fctzen k\u00f6nnen \u2013 jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage\",\"url\":\"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg\",\"contentUrl\":\"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg\",\"width\":1080,\"height\":1350,\"caption\":\"Was ist Malware? Erfahren Sie, wie Malware entsteht und wie Sie sich effektiv davor sch\u00fctzen k\u00f6nnen \u2013 jetzt informieren!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\/\/risawave.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware (Glossar)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/risawave.org\/#website\",\"url\":\"https:\/\/risawave.org\/\",\"name\":\"risawave.org\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/risawave.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/risawave.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/risawave.org\/#organization\",\"name\":\"risawave.org\",\"url\":\"https:\/\/risawave.org\/\",\"logo\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#local-main-organization-logo\"},\"telephone\":[\"015140530884\"],\"openingHoursSpecification\":[],\"email\":\"office@newrella.hk\",\"faxNumber\":\"newrella Limited\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4\",\"name\":\"Sanjay Sauldie (M.Sc.)\",\"sameAs\":[\"https:\/\/risawave.org\"],\"url\":\"https:\/\/risawave.org\/en\/author\/sanjay-sauldie\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#local-main-organization-logo\",\"url\":\"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png\",\"contentUrl\":\"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png\",\"width\":2560,\"height\":2560,\"caption\":\"risawave.org\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"\u8202\u574e\u89d2\" \/>\n<meta name=\"geo.region\" content=\"Hong Kong\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware","description":"What is malware? Find out how malware is created and how to effectively protect yourself from it \u2013 get informed now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/risawave.org\/en\/malware-definition-danger-protection\/","og_locale":"en_GB","og_type":"article","og_title":"Malware (Glossar)","og_description":"Malware (Glossar) - - risawave.org","og_url":"https:\/\/risawave.org\/en\/malware-definition-danger-protection\/","og_site_name":"risawave.org","article_published_time":"2024-11-05T20:52:31+00:00","og_image":[{"width":1080,"height":1350,"url":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg","type":"image\/jpeg"}],"author":"Sanjay Sauldie (M.Sc.)","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sanjay Sauldie (M.Sc.)","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#article","isPartOf":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/"},"author":{"name":"Sanjay Sauldie (M.Sc.)","@id":"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4"},"headline":"Malware (Glossar)","datePublished":"2024-11-05T20:52:31+00:00","mainEntityOfPage":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/"},"wordCount":192,"commentCount":0,"publisher":{"@id":"https:\/\/risawave.org\/#organization"},"image":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage"},"thumbnailUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg","keywords":["#3DDruck","#InnovationDurchAchtsamkeit","#Kostenersparnis","#Lieferkette","#Wertsch\u00f6pfung"],"articleSection":["Cyberkriminalit\u00e4t und Cybersecurity","Automatisierung","Digitale Gesellschaft","Digitale Transformation","KI Glossar"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#respond"]}],"copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/risawave.org\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/","url":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/","name":"Malware","isPartOf":{"@id":"https:\/\/risawave.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage"},"image":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage"},"thumbnailUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg","datePublished":"2024-11-05T20:52:31+00:00","description":"What is malware? Find out how malware is created and how to effectively protect yourself from it \u2013 get informed now!","breadcrumb":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/risawave.org\/malware-definition-gefahren-schutz\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#primaryimage","url":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg","contentUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/malware-definition-gefahren-schutz.jpg","width":1080,"height":1350,"caption":"Was ist Malware? Erfahren Sie, wie Malware entsteht und wie Sie sich effektiv davor sch\u00fctzen k\u00f6nnen \u2013 jetzt informieren!"},{"@type":"BreadcrumbList","@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/risawave.org\/"},{"@type":"ListItem","position":2,"name":"Malware (Glossar)"}]},{"@type":"WebSite","@id":"https:\/\/risawave.org\/#website","url":"https:\/\/risawave.org\/","name":"risawave.org","description":"","publisher":{"@id":"https:\/\/risawave.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/risawave.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Organization","Place"],"@id":"https:\/\/risawave.org\/#organization","name":"risawave.org","url":"https:\/\/risawave.org\/","logo":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#local-main-organization-logo"},"image":{"@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#local-main-organization-logo"},"telephone":["015140530884"],"openingHoursSpecification":[],"email":"office@newrella.hk","faxNumber":"newrella Limited"},{"@type":"Person","@id":"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4","name":"Sanjay Sauldie (M.Sc.)","sameAs":["https:\/\/risawave.org"],"url":"https:\/\/risawave.org\/en\/author\/sanjay-sauldie\/"},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/risawave.org\/malware-definition-gefahren-schutz\/#local-main-organization-logo","url":"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png","contentUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png","width":2560,"height":2560,"caption":"risawave.org"}]},"geo.placename":"\u8202\u574e\u89d2","geo.region":"Hong Kong"},"_links":{"self":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts\/342579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/comments?post=342579"}],"version-history":[{"count":0,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts\/342579\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/media\/342578"}],"wp:attachment":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/media?parent=342579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/categories?post=342579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/tags?post=342579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}