Malware comes in many forms, including viruses, worms, spyware, Trojan horses, and more. Viruses can replicate and spread, worms self-replicate to use system resources, and spyware collects user data without permission. Rootkits conceal running processes and files to maintain unauthorized access. It is important to use antivirus software, keep systems updated, avoid suspicious emails/links, and be wary of unauthorized programs.