{"synopsis":"You may have heard of software, but what about its malicious counterpart? Malware can sneak onto your gadgets and get up to no good! Luckily, Rita and Moby are here to help you protect yourself from Trojan horses, viruses, and worms. You'll learn how these tricky programs can spread to almost any device connected to the Internet, from a computer to a smart fridge. Plus, you'll discover all the nasty things they can do once they arrive, a.k.a. the payload. They might hold your files for ransom, spy on you, steal your personal information, or just break your device. Find out how to defend yourself against these digital villains before you click on anything else online. (Oh, but that \"Play\" button is safe. We promise!)","name":"Malware","display_name":"","name_app":"","EntryID":"475","courses":[],"free":"no","permafree":"","d_updated":"1515646800","sensitive_content":"","subtitles":[{"language":"en","label":"English","file":"\/technology\/computerscience\/malware\/movies\/subtitles_en.vtt"}],"show_on_site":"Yes","moe_approved":null,"lesson_plan":"https:\/\/educators.brainpop.com\/bp-topic\/malware\/","icons":{"high_res_icon":"\/technology\/computerscience\/malware\/icon.png","high_res_icon_180x180":"\/technology\/computerscience\/malware\/icon_180x180.png","high_res_icon_360x360":"\/technology\/computerscience\/malware\/icon_360x360.png"},"screenshots":["\/technology\/computerscience\/malware\/screenshot1.png","\/technology\/computerscience\/malware\/screenshot2.png","\/technology\/computerscience\/malware\/screenshot3.png"],"movies":{"high":"\/new_common_images\/ipad_movies\/27\/272723.mp4","low":"\/new_common_images\/iphone_movies\/27\/272722.mp4","high_v2":"\/technology\/computerscience\/malware\/movies\/272719.mp4","low_v2":"\/technology\/computerscience\/malware\/movies\/272720.mp4","flash":"\/technology\/computerscience\/malware\/mysteries.swf"},"related_jr_topics":[],"related_topics":[{"EntryID":"218","name":"Online Safety","name_app":"","free":"","show_free_tag":"","d_creation":"915166800","url":"\/technology\/digitalcitizenship\/onlinesafety\/","icons":{"high_res_icon":"\/technology\/digitalcitizenship\/onlinesafety\/icon.png","high_res_icon_180x180":"\/technology\/digitalcitizenship\/onlinesafety\/icon_180x180.png","high_res_icon_360x360":"\/technology\/digitalcitizenship\/onlinesafety\/icon_360x360.png"},"screenshots":["\/technology\/digitalcitizenship\/onlinesafety\/screenshot1.png","\/technology\/digitalcitizenship\/onlinesafety\/screenshot2.png","\/technology\/digitalcitizenship\/onlinesafety\/screenshot3.png"],"d_updated":"1508040000","product":"bp"},{"EntryID":"470","name":"Internet","name_app":"","free":"","show_free_tag":"","d_creation":"915166800","url":"\/technology\/computerscience\/internet\/","icons":{"high_res_icon":"\/technology\/computerscience\/internet\/icon.png","high_res_icon_180x180":"\/technology\/computerscience\/internet\/icon_180x180.png","high_res_icon_360x360":"\/technology\/computerscience\/internet\/icon_360x360.png"},"screenshots":["\/technology\/computerscience\/internet\/screenshot1.png","\/technology\/computerscience\/internet\/screenshot2.png","\/technology\/computerscience\/internet\/screenshot3.png"],"d_updated":"0","product":"bp"},{"EntryID":"4665","name":"Information Privacy","name_app":"","free":"","show_free_tag":"","d_creation":"1245700800","url":"\/technology\/digitalcitizenship\/informationprivacy\/","icons":{"high_res_icon":"\/technology\/digitalcitizenship\/informationprivacy\/icon.png","high_res_icon_180x180":"\/technology\/digitalcitizenship\/informationprivacy\/icon_180x180.png","high_res_icon_360x360":"\/technology\/digitalcitizenship\/informationprivacy\/icon_360x360.png"},"screenshots":["\/technology\/digitalcitizenship\/informationprivacy\/screenshot1.png","\/technology\/digitalcitizenship\/informationprivacy\/screenshot2.png","\/technology\/digitalcitizenship\/informationprivacy\/screenshot3.png"],"d_updated":"0","product":"bp"},{"EntryID":"6056","name":"Hackers","name_app":"","free":"","show_free_tag":"","d_creation":"1449676440","url":"\/technology\/computerscience\/hackers\/","icons":{"high_res_icon":"\/technology\/computerscience\/hackers\/icon.png","high_res_icon_180x180":"\/technology\/computerscience\/hackers\/icon_180x180.png","high_res_icon_360x360":"\/technology\/computerscience\/hackers\/icon_360x360.png"},"screenshots":["\/technology\/computerscience\/hackers\/screenshot1.png","\/technology\/computerscience\/hackers\/screenshot2.png","\/technology\/computerscience\/hackers\/screenshot3.png"],"d_updated":"0","product":"bp"}],"path":"\/technology\/computerscience\/malware\/","related_games":[{"EntryID":"781","name":"The Meaning of Beep: Hackers","url":"\/games\/mobhackers\/","type":"meaningofbeep","alignments_description":"","alignment_guid":"F948BF0E-2F71-11E9-975D-C03D1327B6AC"},{"EntryID":"797","name":"The Meaning of Beep: Information Privacy","url":"\/games\/mobinformationprivacy\/","type":"meaningofbeep","alignments_description":"","alignment_guid":"0217D364-2F5D-11E9-88E4-CE7723A05CA6"},{"EntryID":"839","name":"Newsfeed Defenders","url":"\/games\/newsfeeddefenders\/","type":"generic_game","alignments_description":"Can you make it as a News Feed Defender? You'll have to outlaw viral deception, detect hidden ads and banish false reporting! ","alignment_guid":""}],"sortify_games":[],"features":[{"type":"quiz","feature_id":"40604","name":"Quiz","feature_name":"Quiz","alignments_description":"","alignment_guid":"","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/malware\/quiz\/","icon":"\/assets\/images\/quiz_svg_icon.svg"},{"type":"challenge","feature_id":"40606","name":"Challenge","feature_name":"Challenge","alignments_description":"Interactive tasks that playfully assess knowledge of a topic.","alignment_guid":"CCDFAFCA-2F55-11E9-94C1-9388D85A03D9","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/malware\/challenge\/","icon":"\/assets\/images\/challenge_svg_icon.svg"},{"feature_id":"475","type":"concept_map","name":"Make-a-Map","alignments_description":"A concept mapping tool.","alignment_guid":"CD767216-2F55-11E9-BC45-8B59696719E1","url":"\/make-a-map\/?topic=\/technology\/computerscience\/malware\/","requires_flash":"","small_screen_compatible":""},{"feature_id":"475","type":"make_a_movie","name":"Make-a-Movie","alignments_description":"A movie-making tool to produce BrainPOP-style movies.","alignment_guid":"CE9A46FE-2F55-11E9-A0E5-F44B8F5E6FAD","url":"\/make-a-movie\/?topic=475","requires_flash":"","small_screen_compatible":""},{"type":"coding","feature_id":"40603","name":"Creative Coding","feature_name":"Creative coding","alignments_description":"Coding projects offered in both text- and block-based coding languages.","alignment_guid":"E4E1A8BE-EF86-11EB-965D-B2484E495521","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/malware\/creativecoding\/","icon":"\/assets\/images\/creativecoding_svg_icon.svg","coding_types":{"museum":{"type":"museum","instructions":"Code a digital museum about malware."},"story":{"type":"story","instructions":"Code a conversation about malware."},"game":{"type":"game","instructions":"Code a sorting game about malware."},"flag":{"type":"flag","instructions":"Code a flag about malware."},"comic":{"type":"comic","instructions":"Code a comic about malware."},"newscast":{"type":"newscast","instructions":"Code a newscast about malware."},"meme":{"type":"meme","instructions":"Code a meme about malware."}}},{"type":"primary_source_html","feature_id":"46649","name":"Primary Source","feature_name":"Primary Source","alignments_description":"","alignment_guid":"2AA8C5AA-088A-11EC-9D13-9DB49951BB4A","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/malware\/primarysource\/","icon":"\/assets\/images\/primarysource_svg_icon.svg"},{"type":"related_reading","feature_id":"40601","name":"Related Reading","feature_name":"Related Reading","alignments_description":"High-interest, informational texts that extend understanding of a topic.","alignment_guid":"D0FF4958-2F55-11E9-8DD0-883319AAB595","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/malware\/relatedreading\/","icon":"\/assets\/images\/relatedreading_svg_icon.svg"},{"type":"transcript","feature_id":"40674","name":"Movie Transcript","feature_name":"Transcript","alignments_description":"","alignment_guid":"","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/malware\/transcript\/","icon":""},{"type":"worksheet","feature_id":"43275","name":"Worksheet","feature_name":"Worksheet","alignments_description":"","alignment_guid":"AF07D612-0888-11EC-9260-F128FD746FA6","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/malware\/worksheet\/","icon":"\/assets\/images\/worksheet_svg_icon.svg"},{"type":"graphic_organizer","feature_id":"43274","name":"Graphic Organizer","feature_name":"Graphic Organizer","alignments_description":"","alignment_guid":"AE6C7F00-0888-11EC-895A-E4E47C44FF50","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/malware\/graphicorganizer\/","icon":"\/assets\/images\/graphicorganizer_svg_icon.svg"},{"type":"vocabulary","feature_id":"43276","name":"Vocabulary","feature_name":"Vocabulary","alignments_description":"","alignment_guid":"AFAE131A-0888-11EC-81A2-BBBBEB551F17","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/malware\/vocabulary\/","icon":"\/assets\/images\/vocabulary_svg_icon.svg"},{"EntryID":"781","game":"true","name":"Meaning of Beep","game_name":"The Meaning of Beep: Hackers","alignment_guid":"F948BF0E-2F71-11E9-975D-C03D1327B6AC","alignments_description":"","url":"\/games\/mobhackers\/","type":"meaningofbeep","icon":"\/assets\/images\/meaningofbeep_svg_icon.svg","requires_flash":"","small_screen_compatible":"Yes"},{"EntryID":"839","game":"true","name":"GameUp","url":"\/games\/game-finder\/?game_keyword=topic: Malware&topic_id=5ed782e054812621","type":"generic_game","requires_flash":"","small_screen_compatible":"","icon":"\/assets\/images\/gameup_svg_icon.svg","count":3}],"feature_promo":{"featured_1":{"title":"Newsfeed Defenders","type":"game","requires_flash":"","image":"\/games\/newsfeeddefenders\/screenshot1.png","url":"\/games\/newsfeeddefenders\/"},"featured_2":{"title":"Challenge","type":"challenge","image":"\/technology\/computerscience\/malware\/283401.png","url":"\/technology\/computerscience\/malware\/challenge"}},"themes":[{"name":"Computer Science and Coding","display_name":"","path":"\/computerscienceandcoding\/","num_of_resources":26},{"name":"Digital Citizenship","display_name":"Digital Citizenship","path":"\/digitalcitizenship\/","num_of_resources":30}],"alignment_guid":"CC3BA1F0-2F55-11E9-9B88-DABCEE9A5991"}
LOG IN
Please log in to access this feature.

Limited Student Access
This topic is not available for students in Kindergarten, 1st Grade, 2nd Grade, 3rd Grade, 4th Grade, 5th Grade, 6th Grade, 7th Grade, 8th Grade, 9th Grade, 10th Grade, 11th Grade and 12th Grade. Contact your administrator for guidance on teaching this topic.