What is a computer virus? The simple way of thinking about a virus is that it is a malicious software program that enters your device without your knowledge. It then spreads throughout your computer and performs an attack on the network.
With technology changing so much through the years, you may not think a computer virus is anything to worry about. Unfortunately, cyber attacks are still a relevant online threat.
Many types of computer viruses can threaten the security of your device. Unlike humans, your computer cannot rest and recover from a virus. Until you remove it, the virus is there to stay.
According to the AV-TEST Institute, new malware threats have steadily risen during the past year. There can also be different viruses depending on the operating system you have and the device you use.
Windows has been shown to receive more computer viruses than Mac operating systems, but that may be because of the large number of Windows machines in existence. Windows has almost 74% of the operating system market. With Macs becoming more popular, the incidence of viruses will likely increase for them as well.
No matter which device you use, computer viruses are not a thing of the past. Keep reading to learn more about what a computer virus is and why you should still be concerned about online security in the modern tech age.
Viruses vs. malware: What's the difference?
Types of computer viruses
How does a computer virus spread?
History of computer viruses
How to remove a computer virus
Computer virus FAQs
Computer virus definition
A computer virus is a software program that gets built with malicious intent. The purpose of the virus is to perform actions without the device user’s knowledge or consent. The program uses malicious code to complete a destructive activity on the device or network.
Computer viruses sometimes get designed to steal your private data. That could be health information or your financial data. In businesses, a computer virus can bring operations to a halt.
Sometimes viruses get created to interrupt network services. That stalls any work you might need to perform on the device. They can get into the local file system and cause damage that may be difficult or even impossible to repair.
Viruses vs. malware: What’s the difference?
Viruses and malware are two of the most common terms heard in relation to computer security, but what is the difference between them? Let's start by understanding the basics: viruses and malware both refer to malicious software programs that can cause damage to your device or system.
Malware and viruses get thought of interchangeably at times. Malware is an umbrella term that includes spyware, viruses, worms, and any other malicious software.
What is a computer virus?
At its most basic level, a computer virus is a type of malicious software (malware) designed to disrupt normal system operations or steal data. It accomplishes this by replicating itself on other computers without the user’s knowledge or consent. Upon replication, the virus may corrupt files, delete data, or even display unwanted messages on screen.
Viruses typically carry additional malicious code, such as worms or Trojans, which can be used to access confidential information, corrupt system files, steal data from the host machine, and more.
What is malware?
Malware is a type of malicious code or software developed to disrupt, damage, steal data, or gain access to a computer system without the user’s knowledge. Malware is an umbrella term that encompasses various types of threats such as viruses, worms, Trojans, ransomware, spyware, and more.
Malicious attackers have been developing malware for decades to disrupt computers and networks or steal valuable digital assets like money and confidential information.
The difference between a virus and malware
The main difference between a virus and malware is the way in which they spread across multiple systems. A computer virus replicates itself, usually through networks or file-sharing methods, but not all types of malware replicate themselves. Instead, malware can also be spread through email attachments or malicious websites.
While both viruses and malware can cause harm to your system, viruses are more likely to infect multiple machines than malware. Additionally, viruses often contain additional malicious code within the payload that can lead to other forms of cyberattack such as data theft or unauthorized access.
Types of computer viruses
Some computer viruses may come as attachments through trial software or email. Other viruses may get replicated by video files. You should know how the different viruses work so you can protect yourself against online threats.
Boot sector virus
A boot sector virus is a malicious program that spreads by infecting the boot record on diskettes or hard drives. It’s designed to replicate itself when the host machine is booted up, meaning each time you start your computer, the virus copies itself onto another device connected to it such as a USB drive or external storage device.
This particular type of virus was very common in the past but due to modern security measures, its frequency has decreased significantly over time.
A browser hijacker is a type of malware that modifies web browser settings without your permission. It typically alters your browser home page, search preferences, and other settings to redirect traffic and display pop-up ads while browsing.
The hijacker gets revenue from the ads you view. Many browsers try to keep online viral threats to a minimum, but using reliable antivirus is necessary to reduce the risks as much as possible.
A classic example of a browser hijacker is CoolWebSearch (CWS). The hijacker redirected Internet Explorer users to its own website whenever they tried to access certain sites on the web. It also changed the default search engine, took over homepage settings, and distributed advertisements on the web pages viewed through the browser.
A file-infecting virus is a type of computer virus that infects executable files, including those with the .exe, .com, and .bat extensions. This type of virus usually gets into the system through vulnerable software, emails, or websites and can spread to other computers on the same network.
Consider an email attachment containing a malicious file posing as a legitimate document such as a PDF. When opened, it runs an executable program that might change the desktop background image, disable antivirus protection, or create new folders in specific locations on the hard drive.
This malicious code contains instructions to replicate itself across multiple systems by copying itself onto removable media, downloaded software, and email attachments.
A macro virus is a computer virus that uses the scripting language of an application to automatically execute malicious code on a user's machine. Macro viruses can spread quickly since they often take advantage of features like mail merging or automatic data entry in popular applications such as Microsoft Office or Adobe Reader.
For example, a macro virus might be hidden in an infected Excel file sent as an attachment in an email. When the recipient opens the file, they may not immediately see any malicious actions, since this type of virus is executed when the infected macro is run.
This type of infection could allow the sender to access confidential documents or personal information stored on their machine or even sabotage it with malware payloads such as ransomware.
A multipartite virus operates by replicating itself in two or more parts and using different methods for replication. The primary component may reside in the boot sector of the hard drive while the secondary component replicates itself in other file types such as executables.
When someone downloads a malicious program or opens an infected email attachment, the primary component of the virus infects the boot sector and then replicates itself in other files. By doing this, it can spread quickly to other computers on a network or through the internet.
Overwrite viruses are a type of malicious computer virus that destroys any existing data on the system once it has been activated. This type of virus is particularly dangerous because it can damage important files, documents, and other data stored on the infected system, making it impossible to recover or use them again.
Imagine you’ve been working for months on a novel and just finished writing the final chapter when your computer becomes infected with an overwrite virus. If you haven't backed up all your work to another device or online storage service, as soon as the virus was activated all that hard work would be gone forever — wiped!
Polymorphic viruses are a type of malicious software that can modify its own code in order to be able to infect more devices. They are one of the most difficult types of virus to detect and remove because they constantly change their form.
One example of a polymorphic virus is the WannaCry ransomware. This virus spread around the world in 2017 and infected hundreds of thousands of computers through email phishing campaigns.
This malware targeted Microsoft Windows systems by exploiting a known vulnerability in the operating system. Once inside, WannaCry encrypted important files and asked users to pay a ransom fee in order to access them again.
A resident virus is a type of computer virus that can stay in the computer's random access memory (RAM) and continually replicate itself. Resident viruses are often used by malicious actors to spread quickly across computers and networks, allowing them to cause significant damage.
A good example of a resident virus is the Jerusalem virus, which is a computer virus that was first identified in Jerusalem, Israel, in 1987. It works by replicating itself on computers running Microsoft DOS, which allows it to remain resident in memory and become active whenever DOS is used.
The spacefiller virus, also called a cavity virus, works by replicating itself and filling up empty space inside program files.
As with other malicious programs, the spacefiller virus is designed to spread rapidly by attaching itself to executable files or email attachments. Once it infiltrates a system, it begins replicating itself in all available storage spaces, including RAM and disk drives.
A Trojan Horse is a type of software that disguises itself as legitimate software. Its primary purpose is to gain access to, or control over, a computer system without the owner’s consent or knowledge.
Unlike other malware, such as worms and viruses, Trojans do not replicate themselves and are not self-propagating. Instead, they must be manually installed by an attacker in order for them to be effective.
An example of a real-world application of the Trojan Horse virus is a financial institution being targeted by malicious actors. In this scenario, the attackers can gain access to the institution’s computer systems using a Trojan and then use the system to transfer funds from the institution’s accounts without its knowledge or consent.
Web scripting virus
These types of viruses are particularly dangerous because they can spread quickly across large networks and can cause significant damage to infected systems if left unchecked. To better understand how this type of virus works, let’s look at an example.
The Nimda virus, which was first detected in 2001, is a good example of a web scripting virus. The virus uses the Windows Scripting Host (WSH) to spread itself through email messages and internet downloads.
What makes the Nimda virus especially dangerous is that it exploits weak passwords and unpatched security vulnerabilities to gain access to other computers on a network as it spreads.
Keyloggers are a type of virus called rootkit viruses. They can be particularly malicious if they infect your operating system, but some keyloggers also infect your web browser. A keylogger can be an especially dangerous type of malware since it logs your keystrokes — making it easy for someone to hijack your passwords or personal information.
How does a computer virus spread?
Computer viruses can spread through email, removable media, and internet downloads. Sometimes packaged software comes with an attached virus.
Opening emails from people or organizations you don’t recognize can make you easy prey for hackers. Often, an attachment gets included that comes embedded with a virus. You can protect your computer by knowing the reason behind any email attachment before opening it.
Removable media, like USB drives or external hard drives, are not allowed in some organizations because they can spread viruses. When a device is part of a network, the computer virus can spread across the entire network before it gets noticed.
Many businesses have cracked down on computer security because of cyberattacks. In 2020, a computer virus at a healthcare facility forced a network shutdown, costing millions of dollars.
Packaged software and internet downloads can have hidden viruses embedded. You may install a program or update you needed and not realize a virus lurks in the background.
How to prevent computer viruses
When it comes to protecting computers from viruses and malware, prevention is the best protection. There are a number of steps you can take to help ensure your computer is safe from malicious attacks:
1. Use antivirus or anti-malware programs
Make sure you regularly update the software so that it can protect against new threats as they emerge. It's also a good idea to run regular scans of your system in order to ensure any virus or malware hasn’t slipped past the defenses put in place by your antivirus program.
2. Update your devices and apps
Another important measure is keeping both your operating system and any applications you use up to date.
Operating system updates often contain security patches in order to protect against new threats, so make sure you install these as soon as they are released. This is especially important for older systems that may no longer be supported by the manufacturer.
3. Update your router’s firmware
If you’re connecting your computer to a network, it’s important to ensure it is well protected from malicious attacks. Make sure all your network routers and switches have their latest firmware installed and that appropriate firewalls are in place.
4. Don’t use unsecured Wi-Fi
Never leave your computer connected to an unsecured Wi-Fi connection, as this can put you at risk of both viruses and hackers accessing your data without permission.
5. Double-check before you click
Always remember to think before you click. Be suspicious of any emails or links sent from unfamiliar sources and never download any software from untrustworthy websites.
6. Use strong passwords and MFA
Make sure to keep your personal information secure by using several strong passwords for all your accounts and backing up your files regularly in case of a system crash. It’s also a good idea to use multi-factor authentication (MFA) to add an extra layer of security to your accounts.
By following these steps, you can ensure that your computer is well protected against viruses and other malicious threats.
How to remove a computer virus
If your computer is infected with a virus, it’s important to take the necessary steps to remove it as quickly and efficiently as possible. A computer virus can cause havoc on your system, so getting rid of it should be a top priority.
1. Install an antivirus
The first step in removing a virus is downloading and installing an antivirus program that can recognize and detect malware threats. There are many reliable antivirus programs available, so choose one that best suits your needs. We found AVG to be one of the best during our antivirus tests.
2. Disconnect the internet and reboot in safe mode
Once you’ve installed the program, disconnect your device from the internet to prevent further spread of the infection.
After disconnecting, reboot your computer into safe mode, which limits the available programs and features. This provides an opportunity to delete any temporary files that may have been created since the virus was installed.
3. Run a virus scan
Next, you can run a virus scan with your antivirus program, which will identify and locate any malicious software or viruses on your system.
4. Delete or quarantine infected files
Once your antivirus locates the threat, you can either delete it or quarantine it depending on the severity of the infection.
5. Reboot your computer
After removing the threat, reboot your computer in order to ensure that all changes have taken effect before reconnecting to the internet.
6. Update your passwords, apps, and operating system
You should also take this opportunity to change all passwords associated with online accounts connected to your device as well as update software, browser, and operating system versions accordingly. This step is necessary in order to reduce any further risk of exposing your device and data to malicious threats.
By following these steps, you’ll be able to safely remove a virus from your computer. It’s important to remember that prevention is the best way to protect yourself, which is why it’s recommended that you install antivirus software before even encountering an issue.
History of computer viruses
The first computer virus, Creeper system, dates back to 1971. Even though the internet as we know it didn’t exist, viruses were invented to steal information or test processing power and ability. Creeper was created to see if it’s possible for a computer program to self-replicate.
The first Microsoft Windows computer virus written by two brothers, 17 and 24 years old, was called, “Brain.” It was developed to regulate the software they created, as pirates had stolen the heart monitoring software they designed. If stolen software got installed, the virus would copy itself onto the computer.
The virus to first make Apple a target was invented by Rich Skrenta, who was 15 years old then. The Elk Cloner virus was created in 1982 as a joke and would spread through the use of floppy disks. This was the first boot sector virus and every 50th time a machine rebooted, a poem would emerge on the screen.
As technology evolves, more computer viruses get created. During the COVID-19 pandemic, cybercriminals sent mass emails claiming to give updates or information on relief payments. Instead of help, the users downloaded malware.
In 2021, people who used Google may have gotten themselves into a dilemma after clicking on advertisements that hid the MosaicLoader virus. These “ads” were at the top of the search, which made them look more legitimate. Once the virus was installed, it would steal passwords and data. It could also use your computer to mine cryptocurrency.
Computer virus FAQs
What are the 10 most common types of computer viruses?
Unfortunately, viruses can sneak onto almost any device, and some are more prevalent than others. Here are ten of the most common computer viruses:
- Macro virus
- Boot sector virus
- Trojan horses
- Overwrite virus
- Browser hijacker virus
- Web scripting virus
- Polymorphic virus
- Resident virus
- Multipartite virus
- Spacefiller virus
What was the first computer virus?
The first known computer virus was the Creeper system created in 1971.
Who named the first computer virus?
Bob Thomas named the first computer virus after a Scooby-Doo character.
Who created the first computer virus?
Bob Thomas created the first computer virus for BBN Technologies in the U.S.
A computer virus is a software program that is usually designed with malicious intent. It spreads through a computer by email, peripheral devices, and internet browsers. With more viruses getting created every day, these threats are still relevant.
Consider the number of emails you access throughout the week. Most are harmless, but some are not. If you use a USB drive to save and transport data, your computer could be at risk of receiving a nasty virus.
As an informed computer user, a little preparation will pay big dividends for cybersecurity and staying safe online.