Malware and Computer Viruses…Facts and FAQs


Whether you’re on a Windows, Apple, or Linux Computer… A Desktop, Laptop, Smartphone, or Tablet, you’re vulnerable to ever-evolving cyber threats from Computer Viruses and other types of Malware. The first step to protecting yourself and your data is understanding what you’re up against. Here’s an overview of the major types of Malware, today’s most common Computer Viruses, and their potential impact.

The term “Malware” — an amalgamation of Malicious and Software — is now used to describe any malicious Computer Program on a Computer or Mobile Device. These programs are installed without the consent of users and can cause several unpleasant effects, including crippling Computer performance, mining your System for Personally Identifiable Information (PII) and Sensitive Data, erasing or encrypting data, or even hijacking device operations or computer-controlled Hardware. Hackers continuously develop increasingly sophisticated ways to infiltrate user Systems. Like a game of whack-a-mole, as soon as one threat is neutralized, a replacement evolves, and the next iteration emerges. Let’s look at some of the most common types of Malware currently in use.

1. Computer Viruses

Computer Viruses are a type of Malware that earned their name because of how they spread by “infecting” other files on a disk or Computer. Viruses then spread to other disk drives and machines when the infected files are received in downloads from Websites, Email attachments, shared drives, or when carried in files on physical media, such as USB drives or—in the early days—floppy disks.


According to the National Institute of Standards and Technology (NIST), the first Computer Virus, a boot sector virus called “Brain,” was developed in 1986. Tired of customers pirating software from their shop, two brothers claim to have designed the virus to infect the boot sector of software thieves’ floppy disks. The virus spread through infected copies of the pirated software, jumping from the infected floppy disk to the computer hard drive when the program was booted, or loaded onto the new machine.

2. Worms

Unlike viruses, worms don’t require human help to infect, self-replicate or propagate. As soon as they breach a system, they infect their entry point and spread through the device and across any network to which the device connects. By exploiting Network Vulnerabilities—such as missed Operating System (OS) updates or application patches, weak email security, or poor internet safety practices—worms can execute, self-replicate and propagate at an almost exponential rate as each new infection repeats the process.


Originally, most worms simply “ate” System Resources and reduced performance. Now, most worms contain malicious “payloads” designed to steal or delete files upon execution.

3. Adware

One of the most common online nuisances is Adware. Adware programs automatically deliver advertisements to host computers. Familiar examples of Adware include pop-up ads on webpages and advertising messages that are part of the interface of “free” software. While some Adware is relatively harmless, other variants use tracking tools to glean information about your location or browser history. Most of the time, Adware collects information to serve better-targeted ads. But sometimes Adware is used for more nefarious purposes including redirecting search results, displaying pop-ups that can’t be closed or link to malware, disabling antivirus software, or even going all the way off the rails into the territory of spyware—see #4.

Technically, Adware is installed with people’s knowledge and consent. But when was the last time you read through several thousand words “Terms of Service” statement? By clicking the “I Agree” button, you grant consent. Because you have acknowledged and consented to the terms of service, these programs can’t be termed Malware. Today’s Antivirus Software typically identifies these programs as “potentially unwanted programs” (PUPs).


Spyware does just what it says. It spies on what you’re doing at your computer. It collects data such as keystrokes, browsing habits, location data, and even login information. While Adware might include “repurposing” collected data for sale in the terms of service statement, Spyware is more duplicitous. Spyware is considered Malware because users are unaware of it. The only intent of Spyware is malicious. Spyware collects and sells your data to third parties, typically Cybercriminals, with no regard for how the data will be used. Spyware may also modify specific security settings on your computer or interfere with network connections.

In another example of how the line between Adware and Spyware can blur, the rise of mobile computing has seen an explosion of Spyware that tracks user behavior across devices and physical locations without their consent. For example, a free weather app on your Smartphone may have gotten your consent to collect and use your location data, ostensibly to provide more accurate forecasts. You agreed to the app’s terms of service which include language enabling to re-use the location as they see fit, so it’s legitimate. But what happens when that includes selling your location data to anyone who can afford it, regardless of whether it is an online store trying to populate banner ads in your browser or a Cybercriminal who cross-references mobile phone user data with other data sources?


Ransomware infects your computer, encrypts your PII and other sensitive data such as personal or work documents, and then demands a ransom for their release. If you refuse to pay, the data is deleted. Some Ransomware variants lock out all access to your Computer. Sometimes, they might claim to be the work of legitimate Law Enforcement Agencies and suggest that you’ve been caught doing something illegal.


Bots are programs designed to automatically carry out specific operations. Although they serve many legitimate purposes, they are also a popular type of Malware. Once on a computer, Bots can cause the machine to execute specific commands without the user’s approval or knowledge. Hackers may also try to infect multiple computers with the same Bot to create a “Botnet”—short for Robot Network.


These zombie botnets give hackers the ability to remotely manage compromised computers, enabling them to steal sensitive data, spy on user activities, distribute spam automatically, or launch devastating Distributed-Denial-of-Service (DDoS) attacks on computer networks and websites.


Rootkits allow remote access or control of a computer by a third party. These programs are useful for IT professionals trying to troubleshoot network issues remotely, but they can easily become nefarious. Once installed on your Computer, rootkits allow attackers to take complete control of your machine to steal data or install additional Malware. Rootkits are designed to go unnoticed and actively hide their presence and that of other Malware that they install.

As with most Computer viruses and malware, although it’s no guarantee of safety, protecting your devices from rootkits starts with keeping current on all OS and application updates and patches to eliminate potential infection routes. Effective detection of rootkits requires real-time monitoring—not just periodic disk drive scans—for unusual system behavior.

8.Trojan Horses


Commonly called “Trojans,” these programs hide in plain sight by masquerading as legitimate files or software. Once downloaded and installed, Trojans make changes to a computer and carry out malicious activities, without the knowledge or consent of the victim.


Bugs—flaws in Software Code—are not a type of malware. They are errors in Software Code that are popular vectors for attackers with malicious intent. Bugs can, on and of themselves, have detrimental effects on your Computer, such as freezing, crashing, or reducing performance.


Security bugs create holes in a computer or network’s defenses that are especially attractive to would-be attackers. While better security control on the developer end helps reduce the number of bugs, bugs are another reason why keeping current on software patches and System updates are crucial.

Common Computer Virus Myths

  • Any computer error message indicates virus infection. Error messages can also be caused by faulty Hardware or Software Bugs.
  • Viruses and worms require user interaction to activate. False. This is the primary difference between Viruses and Worms. Although viruses do require the activation of their host file to execute, this may be part of an automated process. In contrast, once a worm has breached a System, it can execute, self-replicate and propagate freely with no trigger, human, or automation.
  • Email attachments from known senders are safe. Viruses and Malware often spread by blast emailing the contacts on an infected computer. Even if you know the sender, don’t open any attachments that you aren’t sure about.
  • Antivirus programs will stop all threats. While Antivirus vendors do their best to stay on top of Malware development, it’s important to run a comprehensive internet security product that includes Technologies specifically designed to proactively block threats. Even then, of course, there’s no such thing as 100 percent Security. So, it’s important to adopt safe internet practices to reduce your exposure to attack.

Common Misconceptions About Malware

Malware threats often rely on common misconceptions to create soft targets. By understanding some of the most widely misunderstood points, simple shifts in behavior can remove you from the soft target list.

One of the most common misconceptions about Malware is the assumption that infection is obvious. Users often assume they’ll know if their computer has been compromised. Typically, however, malware intends to perform its task(s) for as long as possible. So, malware doesn’t leave a trail to follow, and your system displays no signs of infection. Even malware like ransomware only makes its presence known after it has encrypted the files, thus completing its first task, to be ransomed back to the user.

Another common misconception is that all reputable websites are safe. Compromising legitimate websites with infected code is one of the easiest ways to convince potential victims to download files or provide sensitive information. This is exactly what happened to the European Central Bank (ECB) in August of 2019.

Many users believe their data—photos, documents, and files—have no value for malware creators. But Cybercriminals mine publicly available data, like that on social networks, to create custom targeted attacks on individuals or to gather intelligence for spear-phishing emails popular for accessing the networks and assets of large, otherwise secure Organizations.


Methods of Malware and Virus Infection and Spread

So how does your Computer become infected by Computer Viruses or Malware? There are many common approaches, but the following are some of the most popular methods owing to their efficacy and simplicity:

  • Downloading infected files as email attachments, from websites, or through filesharing activities.
  • Clicking on links to malicious websites in emails, messaging apps, or social network posts.
  • Visiting compromised Websites, aka drive-by downloads, Viruses can be hidden in HTML, thus downloading when the webpage loads in your browser.
  • Connecting your device to infected external Hard Drives or Network Drives.
  • Operating system and application vulnerabilities provide security loopholes, backdoors, and other exploits
  • Social engineering attacks, such as phishing scams, trick victims into providing sensitive information or access to personal and work systems through customized attacks that often masquerade as legitimate Organizations reporting fake emergencies to push victims to act quickly and without question
  • Connected peripherals, Smart Devices, and Internet-of-Things (IoT) devices can act as vectors, or access points, or they can be hijacked and controlled remotely by the Hacker.

Confidential data, such as passwords, are a key target of Cybercriminals. In addition to using malware to capture passwords, Cybercriminals also collect login details from hacked Websites and Devices, even physical means like peering over your shoulder in a crowded Cafe. That’s why it’s so important to use a unique and complex password for each online account. This means fifteen(15) characters or more and including letters, numbers, and special characters.

The easiest way to do this is through a password manager tool that generates random passwords, stores them securely, and obtains validation/permission before entering the stored credentials while masking the characters. Because so many people re-use passwords, password tools ensure that one compromised account does not cascade through your entire Digital Ecosystem. Also, remember that many security verification questions are ineffective. For example, if the question is “What’s your favorite food?” and you’re in the United States, “Pizza” is a common answer.

Signs of Malware and Computer Virus Infections

While most Malware leaves no telltale signs and leaves your Computer operating normally, sometimes there can be indications that you might be infected. Reduced performance tops the list. This includes slow-running processes, windows that take longer to load than usual, and seemingly random programs running in the background. You may also notice that Internet homepages have been changed in your browser, or that pop-up ads are occurring more frequently than usual. In some cases, Malware can also impact more basic computer functions: Windows may not open at all, and you may be unable to connect to the internet or access higher-level system control functions.

If you suspect that your Computer might be infected, scan your system immediately. If nothing is found, but you’re still in doubt, get a second opinion by running an alternative Antivirus Scanner. Check out these free tools: Free Cloud Anti-Virus Software and Free Ransomware Protection & Decryption Tools.

Ideally, you want to prevent an attack, not discover it. While you should scan your device as soon as you suspect something amidst, your best defense is a comprehensive internet security solution that includes real-time scanning and monitoring of disk drives, files, and activities as well as real-time updates on web threats provided by a team of experienced Cyber Security professionals. This includes monitoring instant messaging services, scanning email attachments, providing a firewall and so much more than scheduled scans and periodic updates. Effective Antivirus and Cyber Security Software should be able to work and coordinate between all your devices.



Awareness would minimally reduce the falling victim to any of this Malware and Viruses. It cannot be completely ruled out, but looking out for unusual events is key to tracking them down just in time.

0 0 votes
Article Rating
Notify of
Inline Feedbacks
View all comments
Social Engineering…. Tips to help avoid becoming a Victim

Social Engineering…. Tips to help avoid becoming a Victim

Social engineering is the act of tricking someone into divulging information or

How Secure is a VPN? What makes a Safe VPN?

How Secure is a VPN? What makes a Safe VPN?

Surfing the web can be risky

You May Also Like
Would love your thoughts, please comment.x