Are they Americans, Nigerian princes, companies that sell anti-malware products?
From the democratandchronicle.com
Although they seem to come from nowhere, every new bit of malware has a history.
From the newscientist.com
The bad news is that more devious forms of malware are cropping up all the time.
From the economist.com
I also have never clicked on any weird links or have any malware on my computer.
From the forbes.com
A more dangerous form of these malware rogues however, appeared in October 2010.
From the en.wikipedia.org
One, that currently existing anti-malware software probably isn't robust enough.
From the techcrunch.com
It's not considered malware because the user might want that activity to happen.
From the forbes.com
This allows URLs that distribute malware or engage in phishing to be identified.
From the en.wikipedia.org
Of all the malware infections I've ever seen, only one was not caused by piracy.
From the en.wikipedia.org
More examples
Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. ...
Software developed for the purpose of causing harm to a computer system
Software which has been designed to operate in a malicious, undesirable manner
A generic name for software which intentionally performs actions which can damage data or disrupt systems.
A generic term for a number of different types of malicious code.
Malware is a generic term for any malicious software designed to disrupt the working of a network. Virus, worms and Trojans fall under the category of Malware. ...
A generic term for "malicious software" - any program or file that is harmful to a computer user. The term includes computer viruses, worms, Trojan horses, and also spyware programming that gathers information about a computer user without permission.
Software designed to cause harm to the victim where it is installed; such as stealing identity information, releasing viruses or worms, or presenting ads.
Malicious software such as a virus, worm, trojan horse, or spyware that is installed on a system with harmful or malicious intent. Some malware uses technical vulnerabilities (such as buffer overflow) to attack a machine, whereas other types of malware instead uses social vulnerabilities, i.e. ...