Malware writers are very experienced in using tricks to get users to download their malware. Software that comes bundled with "other software" is often called a Trojan Horse. For example, an instant messenger software bundled with a program such as WildTangent, a known spyware offender. Peer-to-peer file sharing software, such as Kaaza, LimeWire, and eMule, bundle various types of malware that are categorized as spyware or adware. Software that promises to speed up the Internet connection or assist with downloads (e.g., My Web Search) will often contain adware. Another common way to infect a computer through email containing a seemingly benign link or email attachment.
Malware can exploit security holes in your browser as a way of invading your machine. Sometimes websites state that software is needed to view the site, in an attempt to trick users into clicking "Yes" thus installing software onto their machines. Another trick is if you click "No," many error windows display. Other sites will tell you that using a certificate makes their site "safe" which is not the case. Certificate verification means only that the company that wrote the software is the same as the company whose name appears on the download prompt.
Some malware provides no uninstall option, and installs code in unexpected and hidden places (e.g., the Windows registry) or modifies the operating system, thus making it more difficult to remove