A computer virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions
coded into the program by the malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload. Every virus has a payload that performs an action. The threat actor can code any malicious activity into the virus payload, including simple, innocuous pranks that don’t do any harm. While a few viruses have harmless payloads, most of them cause damage to the
system and its data. There are nine main virus types, some of which could be packaged with other malware to increase the chance of infection and damage. The nine major categories for viruses are: Computer viruses are
standard programs; only instead of offering useful resources, these programs can damage your device. For a threat actor to execute a virus on your machine, you must initiate execution. In some cases, an attacker can execute malicious code through your browser or remotely from another network computer. Modern browsers have defenses against local machine code execution, but third-party software installed on the browser could have vulnerabilities that allow viruses to run locally. The
delivery of a computer virus can happen in several ways. One common method is via a phishing email. Another technique is hosting malware on a server that promises to provide a legitimate program. It can be delivered using macros or by injecting malicious code into legitimate
software files. Computer viruses can damage your PC, send sensitive data to attackers, and cause downtime until the system is repaired. You can avoid becoming the next computer virus victim by following a few best practices:Definition
Types of Computer Viruses
What Causes Computer Viruses?
How to Prevent Computer Viruses
This information gives an introduction to viruses and ways to avoid them. US-CERT offers many resources to help you create a more secure home computing environment. These documents may be of particular interest if you have concerns about viruses and Trojan horses: What
is a virus? Unlike worms, viruses often require some sort of user action (e.g., opening
an email attachment or visiting a malicious web page) to spread. What do viruses do?Frequently Asked Questions
For More Information
Frequently Asked Questions
A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Some viruses are harmless, others may damage data files, and some may destroy files. Viruses used to be spread when people shared floppy disks and other portable media, now viruses are primarily spread through email messages.
A virus is simply a computer program--it can do anything that any other program you run on your computer can do. Some viruses are designed to deliberately damage files, and others may just spread to other computers.
What is a worm?
A worm is a type of virus that can spread without human interaction.
Worms often spread from computer to computer and take up valuable memory and network bandwidth, which can cause a computer to stop responding. Worms can also allow attackers to gain access to your computer remotely.
What is a Trojan horse?
A Trojan horse is a computer program that is hiding a virus or other potentially damaging program. A Trojan horse can be a program that purports to do one action when, in fact, it is performing a
malicious action on your computer. Trojan horses can be included in software that you download for free or as attachments in email messages.
Can I get a virus by reading my email messages?
Most viruses, Trojan horses, and worms are activated when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message. It's best to limit what
HTML is available in your email messages. The safest way to view email messages is in plain text.
How can I avoid a virus infection from email?
Most users get viruses from opening and running unknown email attachments. Never open anything that is attached to an email message unless you know the contents of the file. If you receive an attachment from a familiar email address, but were not expecting anything, you should contact the sender
before opening the attachment. If you receive a message with an attachment and you do not recognize the sender, you should delete the message.
Selecting the option to view your email messages in plain text, not HTML, will also help you to avoid a virus.
What are some tips to avoid viruses and lessen their impact?
- Install anti-virus software from a reputable vendor. Update it and use it regularly.
- In addition to scanning for viruses on a regular basis, install an "on access" scanner (included in most anti-virus software packages) and configure it to start each time you start up your computer. This will protect your system by checking for viruses each time you run an executable file.
- Use a virus scan before you open any new programs or files that may contain executable code. This includes packaged software that you buy from the store as well as any program you might download from the Internet.
- If you are a member of an online community or chat room, be very careful about accepting files or clicking links that you find or that people send you within the community.
- Make sure you back up your data (documents, bookmark files, important email messages, etc.) on disc so that in the event of a virus infection, you do not lose valuable work.