Be Smart, Be Technical

Dedicated Server

Computer Virus and Malware Symptoms, Myths, How To Prevent

Computer Virus

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.

Computer Virus :Computer viruses earned their name due to their ability to “infect” multiple files on a computer. They spread to other machines when infected files are sent via email or when carried by users on physical media, such as USB drives or (in the early days) floppy disks. According to the National Institute of Standards and Technology (NIST), the first computer virus, called “Brain,” was developed in 1986. Tired of customers pirating software from their shop, two brothers claim to have designed the virus to infect the boot sector of software thieves’ floppy disks; when the disks were copied, the virus was passed on.


Computer Worms

Worms :Unlike viruses, worms don’t require human help in order to spread and infect: they infect once and then use computer networks to spread to other machines — without the help of users. By exploiting network vulnerabilities — such as weaknesses in email programs — worms can send out thousands of copies of themselves in the hope of infecting new systems, where the process begins again. While many worms simply “ate” system resources, thus reducing performance, most now contain malicious “payloads” designed to steal or delete files.


Adware :One of the most common online nuisances is adware. The programs automatically deliver advertisements to host computers. Familiar types of adware include pop-up ads on webpages and in-program advertising that often accompanies “free” software. While some adware is relatively harmless, other variants use tracking tools to glean information about your location or browser history and serve up targeted ads to your screen. As noted by BetaNews, a new form of adware has been detected that can disable your antivirus software. Since adware is installed with people’s knowledge and consent, such programs can’t be termed malware: typically, they’re identified as “potentially unwanted programs.”


Computer Spyware


Spyware :Spyware does just what it says: It spies on what you’re doing at your computer. It collects data such as keystrokes, browsing habits and even login information, which is then sent to third parties, typically cybercriminals. It may also modify specific security settings on your computer or interferes with network connections. According to TechEye, emerging forms of spyware may allow companies to track user behavior across multiple devices without their consent.


Computer Ransomware

VPS Hosting

Ransomware : Ransomware infects your computer, then encrypts sensitive data such as personal documents or photos and demands a ransom for their release. If you refuse to pay, the data is deleted. Some ransomware variants lock out all access to your computer. They might claim to be the work of legitimate law enforcement agencies and suggest that you’ve been caught doing something bad. In June 2015, the FBI’s Internet Crime Complaint Center received complaints from users reporting $18 million in losses from a common ransomware threat called CryptoWall.


Bots :Bots are programs designed to automatically carry out specific operations. They’re useful for many legitimate purposes, but have also been repurposed as a type of malware. Once on a computer, bots can cause the machine to execute specific commands without the user’s approval or knowledge. Hackers may also try to infect multiple computers with the same bot to create a “botnet” (short for robot network), which can then be used to remotely manage compromised computers — to steal sensitive data, to spy on the victim’s activities, to distribute spam automatically or to launch devastating DDoS attacks on computer networks.


Rootkits : Rootkits allow remote access or control of a computer by a third party. These programs are useful for IT professionals trying to troubleshoot network issues at a distance, but they can easily become nefarious: Once installed on your computer, rootkits allow attackers to take complete control of your machine to steal data or install other pieces of malware. Rootkits are designed to go unnoticed and actively hide their presence. Detecting this kind of malicious code requires manual monitoring for unusual behavior, along with regularly patching your operating system and software to eliminate potential infection routes.


Trojan Horse : Commonly called “Trojans,” these programs hide in plain sight by masquerading as legitimate files or software. Once downloaded and installed, Trojans make changes to a computer and carry out malicious activities, without the knowledge or consent of the victim.


Computer Bug

Bugs : Bugs — flaws in pieces of software code — are not a type of malware but mistakes made by a programmer. They can have detrimental effects on your computer, such as freezing, crashing or reducing performance. Security bugs, meanwhile, act as easy ways for attackers to slip past your defenses and infect your machine. While better security control on the developer end helps eliminate bugs, it’s also critical to apply software patches, which address specific bugs in the wild.



  • Any computer error message indicates virus infection. This is false — error messages can also be caused by faulty hardware or software bugs.
  • Viruses and Warms Always require user-interaction. False. Code must be executed in order for a virus to infect a computer, but this doesn’t require user-interaction. For example, a network worm can infect automatically if certain vulnerabilities exist on a user’s computer.
  • Email attachments from known senders are safe. Not true, because they might have been infected by a virus and be used to spread the infection. Even if you know the sender, don’t open anything you aren’t sure about.
  • Antivirus programs will stop all threats. While antivirus vendors do their best to stay on top of malware developments, it’s important to run a comprehensive Internet security product that includes technologies specifically designed to proactively block threats. Even then, of course, there’s no such thing as 100 percent security. So, it’s important to adopt an online common sense to reduce your exposure to attack.
  • Viruses can inflict physical damage on your computer. What if bad code makes your machine overheat or destroys critical microchips? Antivirus providers have debunked this myth multiple times — damage like this simply isn’t possible.


Common Injection Methods

Computer Virus Attack

So how does your computer become infected by computer viruses or malware? There are several common ways. These include clicking on links to malicious sites in email messages or messages in social networks, visiting a compromised website (known as a drive-by download), and inserting an infected USB flash drive on your computer. Operating system and application vulnerabilities make it easy for cybercriminals to install malware on computers. So it’s vital that you apply security updates as soon as they become available to reduce your exposure to risk.

Cybercriminals often make use of social engineering to trick you into doing something that jeopardizes your security or the security of the company you work for. Phishing emails are one of the most common methods. You receive an email that looks legitimate and convinces you to download an infected file or visit a malicious website. Here, the goal of hackers is to create something you find convincing, such as a supposed virus warning, notification from your bank, or message from an old friend.

Confidential data, such as passwords, are a key target of cybercriminals. As well as using malware to capture passwords as they are typed, cybercriminals also collect passwords from websites and other computers they have been able to hack. That’s why it’s so important that you use a unique, complex password for each online account. This means 15 characters or more, made up of letters, numbers, and special characters. This way, if one account is compromised, cybercriminals don’t get access to all your online accounts. Of course, if you use easy-to-guess passwords, cybercriminals may not need to compromise your machine or the website of an online provider.

Unfortunately, most users have woefully weak passwords. Instead of using strong, hard-to-guess passwords, they rely on standbys, like “123456” or “Password123,” which are easy for attackers to guess. Even security questions may not act as an effective barrier, because many people give the same answer: If the question is “What’s your favorite food?” and you’re in the United States, “Pizza” is a common answer.


Signs You Are Infected

While most malware leaves no telltale signs and leaves your computer operating normally, sometimes there can be indications that you might be infected. Reduced performance tops the list — this includes slow-running processes, windows that take longer to load than usual, and seemingly random programs running in the background. You may also notice that Internet homepages have been changed in your browser, or that pop-up ads are occurring more frequently than usual. In some cases, malware can also impact more basic computer functions: Windows may not open at all, and you may be unable to connect to the Internet or access higher-level system control functions. If you suspect that your computer might be infected, scan your system immediately. If nothing is found, but you’re still in doubt, get a second opinion — run an alternative antivirus scanner.