Most people have heard about or have some general understanding of what a computer virus is. They are the oldest forms of cyber threat and are called viruses because they mimic the behavior of biological viruses that we see in nature.
Viruses are nasty pieces of malware (malicious computer software) that can take control of your devices (desktop,
Unfortunately, if you are unlucky enough to have your device catch a virus, it very likely will wreak havoc on your device’s storage, destroy files, mess with your device’s configuration, make your device unusable, and in the worst of cases cause permanent damage to your device – and that may just be the start of the nasty things it could do.
One of the primary differences between viruses and other forms of malware, is that they are specifically designed to spread and replicate. So not only is your device a target but every device is a target and once the virus is on one of your devices it could spread to every other device your device is somehow connected to. This is one of the truly evil things about them.
What are the types of computer viruses out there?
As you might expect, there are numerous computer virus types, and the bad actors are a creative bunch and constantly coming up with new and more evil types. But in general, there are 6 categories of viruses that are deployed.
Boot sector virus
These viruses take control of your device’s boot drive (typically a hard drive). They overwrite or damage the boot sector or more specifically the master boot record. This is the part of the boot drive that allows your device’s operating system to load. Once compromised your device becomes non-functioning.
Resident virus
These are similar to direct action viruses, as both are types of file infector viruses. Resident viruses install themselves on devices. They are more dangerous and trickier to eradicate than direct action viruses.
Resident viruses can infect very quickly or do so slowly to be less visible. Resident viruses need to be removed with anti-malware software immediately, as the virus can potentially infect your entire anti-virus software.
Direct action virus
These viruses work by attaching to existing .exe or .com files when installed or executed. Once this occurs, the virus spreads to other existing files and can render them inaccessible. While direct action viruses are unwanted and can hinder your ability to access files on your device, they are not usually able to delete files entirely and can be removed with an anti-virus program.
Polymorphic virus
These viruses are extremely difficult to recognize because they are constantly changing shape. They actually change their software code every time they infect a new file making it difficult for
Multipartite virus
These viruses have a double dose of trouble because they can infect both your device’s boot section and your files. And they do so at the same time.
They are also resilient because even if you clean up one infected component, these viruses can jump from one file to another and cause a reinfection. So, it’s a bit like “whack-a-mole” and you need a quality hammer (antivirus/antimalware) to kill them.
Macro virus
These viruses are built in macro languages like the ones found in apps like Word, Excel, PowerPoint, etc. The fact that they are hidden inside commonly used files is one of the reasons they are very effective for hackers. These files are accessed by nearly everyone every day. So hackers know people don’t always pay attention and click when they see one of these file types, whether on a file sharing service or as an attachment to an email.
These viruses are also really nasty because they often use your own contact lists to replicate themselves by sending the same email to all of your contacts without your knowledge. They use you and your device to spread the virus even further.
So How Do I Get a Computer Virus?
There are many ways that your devices could be infected with a computer virus, but generally speaking, the five most common methods are:
Email is the most common and most successful form of infecting viruses on devices. There are a number of methods bad actors use to deliver viruses using email.
The most widely used is through email attachments. If the user opens the attachment files it unleashes the virus onto the device. Attachments can be executable files (.exe, .com, .zip, .dll, .pif, .vbs, .js, .scr) or even files that support macros (excel, word, powerpoint, etc).
Another method is through an infected email body. The advent of HTML (hypertext markup language), which supports embedded objects and executable code has made this a challenge. Many email services are disabling HTML by default to prevent/mitigate this type of virus delivery.
A third is through links in the phishing email that lure the user to bad actor websites. Prompting or luring users to take actions that result in inadvertently downloading a virus or other malware.
IM or SMS
Instant Message or SMS is another platform that hackers use to infect devices. This happens a lot on
Like emails, SMS messages can contain links or attachments that, if the user clicks or accesses the attachment, will result in the downloading of the virus.
File sharing services
File Sharing services like Dropbox, Sharepoint, One Drive, and Google Drive. all have the potential to spread viruses from one user to another. These services sync files across devices and across users and if unchecked, it is highly possible that unsuspecting users end up accessing these infected files, which in turn infect the device they are using to access such files.
Antivirus fakeware
Antivirus fakeware is another method bad actors use to infect user devices. Often, when users surf the internet, they may access an unknown or unfamiliar site that causes some type of popup to display indicating that their device is infected and that the software promoted in the popup can fix the problem.
This is a total con job but is really scareware used to intimidate users into downloading the supposed
Unpatched software
Unpatched software can be a wide-open hole for hackers to access and infect your devices. This is particularly true of popular apps like Microsoft Office, Adobe Reader, and SMS apps. You need to keep your apps up to date with patches. Developers often release patches to remedy
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
Best Strategies to Protect Yourself from a Computer Virus?
It seems pretty clear and I would say probably obvious that it is best to avoid getting a computer virus. They are a pain and can do real damage. If you get one, it is highly likely that you will pass it on to other devices of yours, your friends, your work colleagues, etc.
So what are the best ways to prevent and avoid getting a virus?
The first thing is to use good old common sense and basic cybersecurity practices. This includes:
Do NOT just click links your friends, colleagues or anyone else sends you. Check, double-check and then check again that the link is safe before you click.
Do NOT open any email attachment unless you 100% know what it is. Bad actors rely on human curiosity — a common social engineering technique — to spread viruses. Do not let them lure you in.
IGNORE “Your PC is infected!” warnings. DO NOT click on hysteria popups that aren’t coming from your own
Disable macros in Microsoft Office and other apps that offer macros. Only reenable for MS Office documents or other files that you know are safe after you have downloaded or copied the documents/files.
But even if you diligently do all the good cyber practices above and more, invest in a quality
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
Recommended Reading
What is Spyware?
Spyware is malware that infects your digital device, spies on you, and sends your private data back to the cybercriminals.
What is a Remote Access Trojan (RAT)?
A remote access Trojan is a software used by hackers to gain unauthorized access and remote control on a user’s computer or mobile device, including mouse and keyboard manipulation.
14 Ways to Secure Your Home Wireless Network
Many homeowners are just unaware of the security threats that a wireless network might provide if not adequately safeguarded by a secure Wi-Fi network. We would never leave our house's front door unlocked. So you should do the same and never leave your Wi-Fi networks unprotected since it exposes you to the same or even worse threats.
What to do if your phone is lost or stolen
When your phone is lost or stolen, it is more than just a pricey handheld that is lost. Our phones keep track of our lives. If you’ve lost your phone, there are things you can do to track, locate, and recover it depending on the type of phone you have. Read this to get tips on how.
Is Cyber Security Awareness Training Critical for SMBs?
You might think that cyber security awareness training is not for small businesses. You might also think that the bad guys are more interested in bigger companies. You probably should read this because you would be wrong on both counts.
What is a WPA2 Password
Your Wi-Fi password is the network security pass you use to connect to your home network. This password is important because it protects your system from intruders.