This information gives an introduction to viruses and ways to avoid them. US-CERT offers many resources to help you create a more secure home computing environment. These documents may be of particular interest if you have concerns about viruses and Trojan horses: What
is a virus? Unlike worms, viruses often require some sort of user action [e.g., opening
an email attachment or visiting a malicious web page] to spread. What do viruses do? What is a worm? What is a Trojan horse? Can I get a virus by reading my email messages? How can I avoid a virus infection from email? Selecting the option to view your email messages in plain text, not HTML, will also help you to avoid a virus. What are some tips to avoid viruses and lessen their impact?Frequently Asked Questions
For More Information
Frequently Asked Questions
A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Some viruses are harmless, others may damage data files, and some may destroy files. Viruses used to be spread when people shared floppy disks and other portable media, now viruses are primarily spread through email messages.
A virus is simply a computer program--it can do anything that any other program you run on your computer can do. Some viruses are designed to deliberately damage files, and others may just spread to other computers.
A worm is a type of virus that can spread without human interaction.
Worms often spread from computer to computer and take up valuable memory and network bandwidth, which can cause a computer to stop responding. Worms can also allow attackers to gain access to your computer remotely.
A Trojan horse is a computer program that is hiding a virus or other potentially damaging program. A Trojan horse can be a program that purports to do one action when, in fact, it is performing a
malicious action on your computer. Trojan horses can be included in software that you download for free or as attachments in email messages.
Most viruses, Trojan horses, and worms are activated when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message. It's best to limit what
HTML is available in your email messages. The safest way to view email messages is in plain text.
Most users get viruses from opening and running unknown email attachments. Never open anything that is attached to an email message unless you know the contents of the file. If you receive an attachment from a familiar email address, but were not expecting anything, you should contact the sender
before opening the attachment. If you receive a message with an attachment and you do not recognize the sender, you should delete the message.
There are a few things you can do to help protect yourself from malware attacks:How to Stay Protected from Malware Attacks
Malware is usually distributed through malicious websites, emails, and software. Malware can also be hidden in other files, such as image or document files, or even in seemingly innocuous files,
such as .exe files.How do I get malware?
Users can unintentionally install malware when they click on a link in a phishing email, or when they download and install software from a website that is not reputable. Malware can also be installed on a computer when the user plugs in an infected USB drive, or when the user visits a website that is infected with malware.
There are many different ways that malware can infect your PC. One common way is through infected files that you download from the Internet. Malicious code can be hidden in all kinds of files, including videos, pictures, and software. When you open these files on your PC, the malware can infect your system and cause damage. Another common way that malware can infect your PC is through
malicious websites. If you visit a website that is infected with malware, the malware can automatically download and install itself on your PC without your knowledge. In addition, malware can also be spread through email attachments. If you open an email attachment that is infected with malware, the malware can install itself on your PC and cause damage.How malware can infect your PC
No, malware is not a virus. Malware is a type of software that is designed to cause harm to a computer or its users. Viruses are a specific type of malware that can spread from one computer to another. Is malware a virus?
Malware is
software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money. There are many ways to detect malware, but the most common is to scan the computer for malicious files or programs. Malware can be installed in a variety of ways, including through email attachments, drive-by downloads, or by clicking on links in malicious websites. It can also be installed through vulnerabilities in software that the
user has installed on their computer.How to detect malware?
" There is no one-size-fits-all answer to this question, as the best way to remove malware may vary depending on the specific malware that is installed on your computer. However, some common methods for removing malware include using an antivirus program to scan
your computer for malware and then delete any malware that is found, using a malware removal program to scan your computer for malware and then delete any malware that is found, or manually deleting any malware that is found on your computer.How to remove malware
Yes, mobile devices can get malware. In fact,
there’s been a surge in malware targeting mobile devices in recent years. Some of the primary ways that mobile devices can get malware include downloading infected apps, opening infected email attachments, and visiting infected websites. There are a variety of measures that you can take to help protect your mobile device from malware, including installing a quality antivirus app, being careful about which apps you download, and avoiding suspicious-looking websites.Do mobile devices get malware?
Unfortunately, there is a lot of malware out there, but understanding the different types of malware is one way to help protect your data and devices: Viruses A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the
malicious action. Once the victim opens the file, the device is infected. Ransomware One of the most profitable, and therefore one of the most popular, types of malware amongst cybercriminals is ransomware. This malware installs itself onto a victim’s machine, encrypts their files, and then turns around and demands a ransom [usually in Bitcoin] to return that data to the user. Scareware Cybercriminals scare
us into thinking that our computers or smartphones have become infected to convince victims to purchase a fake application. In a typical scareware scam, you might see an alarming message while browsing the Web that says “Warning: Your computer is infected!” or “You have a virus!” Cybercriminals use these programs and unethical advertising practices to frighten users into purchasing rogue applications. Worms Worms have the ability to copy themselves
from machine to machine, usually by exploiting some sort of security weakness in a software or operating system and don’t require user interaction to function. Spyware Spyware is a program installed on your computer, usually without your explicit knowledge, that captures and transmits personal information or Internet browsing habits and details to its user. Spyware enables its users to monitor all forms of communications on the targeted device.
Spyware is often used by law enforcement, government agencies and information security organizations to test and monitor communications in a sensitive environment or in an investigation. But spyware is also available to consumers, allowing purchasers to spy on their spouse, children and employees. TrojansTypes of malware?
Trojans masquerade as harmless applications, tricking users into downloading and using them. Once up and running, they then can steal personal data, crash a device, spy on activities or even launch an attack.
Adware
Adware programs push unwanted advertisements at users and typically display blinking advertisements or pop-up windows when you perform a certain action. Adware programs are often installed in exchange for another service, such as the right to use a program without paying for it.
Fileless malware
Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. Fileless malware registry attacks leave no malware files to scan and no malicious processes to detect. It does not rely on files and leaves no footprint, making it challenging to detect and remove.
The most common signs that
your computer has been compromised by malware are: The more of these common symptoms you see, the higher the likelihood your computer has a malware
infection. Browser redirects and large numbers of pop-up warnings claiming you have a virus are the strongest indicators that your computer has been compromised. Even though there are a lot of types of malware out there, the good news is, there are just as many ways to protect yourself from malware. Check out these top tips: Protect your devices Be careful online Pay attention to downloads and other software purchases Perform regular checksHow do I know I’ve been infected with malware?
How can I protect myself from malware?