What is a Computer Virus? The Top 5 Types
What is a Computer Virus?
A computer virus is malicious software or code that infects files and programs on your computer. Opening an infected file will execute the virus code and result in damage to your files, your computer, and your overall internet security. Read on to learn about the most common types of computer viruses and the ways to get rid of them.
What you will find out in this article:
- What Is a Computer Virus?
- What Types of Computer Viruses Exist?
- Examples of Computer Viruses
- How to Remove a Computer Virus
Computer viruses can have devastating effects on your personal data, your files, and your online privacy. Read our comparison of the best antivirus software to find a program that offers real-time protection and swiftly removes viruses.Tibor Moes
A computer virus
A computer virus is not that different from a real-life virus like, say, the flu. When contracted, they can both remain dormant in the system only to become active when you least expect them to. If you detect the threat early and take appropriate measures on time, you will be able to keep the symptoms under control and recover very quickly. Left untreated, however, not only can viruses spread to others but they can also wreak havoc on the health and wellbeing of their host.
What Is a Computer Virus?
A computer virus is executable malicious software or code that self-replicates by taking control of other programs on an infected computer. Designed to spread from one host computer to another, a computer virus latches onto a piece of software or a document and remains there until a user opens the file in question. When they do, the virus will start executing its code and cause damage to the host computer.
There are many ways how you can contract a computer virus – via file downloads, email attachments, compromised software installations, or scam links on social media. You can then spread the virus by sharing infected files or links with others. If your computer is part of a network, just one user opening a compromised file on their desktop could be enough to take the entire network down.
Although there have been some “good” viruses with helpful effects on host machines, computer viruses are bad by definition. When executed, they can spam your email and social media contacts, corrupt files on your hard drive, and slow down your computer. Viruses can steal your passwords and change your login data to lock you out of your email and social media profiles, online banking accounts, or even your computer. In the worst-case scenario, they can wipe all the data from your hard drive in just seconds.
What Types of Computer Viruses Exist?
There are well over a million viruses in the world, with many more created daily. They are evolving very fast, so those that were once considered extremely dangerous are now routinely taken care of by the best antivirus software. Based on their severity and the way in which they can affect your machine, there are about a dozen types of computer viruses. Here are the five worst types that you should know.
1. Macro Viruses
Perhaps the most common type of computer viruses, macro viruses attach themselves to files made in programs that support macros, sequences of commands that can be executed with a simple keystroke. These viruses are most commonly found in Microsoft Word documents and Excel spreadsheets.
Most often distributed via email attachments, macro viruses are activated when you open the infected file. If you do it directly in your email client, the virus will then send the exact copy of the file to all addresses in your contacts list. If you download the file to your computer and then open it, the macro virus will spread to other .docx and .xls files on your computer network and alter their content.
2. File Infectors
Whereas macro viruses usually infect files made in Microsoft Office, file infectors attach themselves to executable files with .exe and .com extensions. When you open an infected file to launch a program, you will unknowingly launch the virus, too. The virus can then overtake the program and spread to other executable files on your hard drive or your computer network.
The main purpose of file infectors is to compromise files and data on users’ machines and networks, create peer-to-peer botnets, and disable security software on connected computers. Some file infectors will rewrite all executable files that launch on startup, thus effectively taking control of the computer. There have also been cases where macro viruses had completely reformatted infected hard drives.
3. Browser Hijackers
As their name suggests, browser hijackers take control over certain features in your web browser. They usually change your homepage to some fake search engine and overwrite the settings so that you can’t change it. When you type an address and hit Enter, the virus will take you to a completely different website and ask you to click on a banner or sign up for something to access the site you want to see.
In most cases, browser hijackers are intended to generate revenue for their developers by showing clickable ads within the browser. They are most often bundled with free software and browser toolbars that offer advanced search features. Thankfully, they are easily detected by most antivirus programs.
4. Web Scripting Viruses
Web scripting viruses target popular websites, usually in a very sneaky way. These viruses overwrite the code of the website to insert links and videos that will install malicious software on users’ computers. In many cases, website owners don’t even know that they’re hosting potentially harmful content. All an experienced hacker has to do to infect a page is to write the malicious code and post it as a comment.
Some web scripting viruses do little more than serve you textual and visual ads to generate income for their creators. However, some can steal your cookies and use the information to post on your behalf on the infected website. Luckily, most antivirus programs will alert you when visiting a malicious website.
5. Boot Sector Viruses
Although not as prevalent now as they once were, boot sector viruses can still appear in one form or the other. Back when computers were booted from floppy disks, these viruses were very common. They would infect the system partition of the hard drive and launch on computer startup.
Nowadays, these viruses are mostly distributed through surviving forms of physical media – USB and external hard drives. They no longer pose a major threat, though, as most operating systems have safeguards that protect the boot sector of the hard drive from malicious software. Even if they do somehow infect your systems, most antivirus programs can remove boot sector viruses with ease.
Examples of Computer Viruses
Some of the most dangerous and/or most notorious examples of computer viruses include the following:
- Melissa was a macro virus that spread via infected email attachments and caused $80 million in damages. Its founder David L. Smith served a 20-month prison sentence and was forbidden from accessing computer networks without authorization.
- Yankee Doodle was a Bulgarian-made non-destructive file infector that would start playing the song “Yankee Doodle” on infected computers every day at 5 PM.
- Shamoon is a destructive virus that could wipe all data from a network of computers in a matter of seconds. Developed as a weapon in cyberwarfare against the Saudi energy sector, it was isolated in 2014, only to make a return (as “Shamoon 2”) two years later.
- Klez was a macro virus that would disable antivirus software on the infected computer and spam the victim’s email inbox to prevent them from receiving new messages.
How to Remove a Computer Virus
There are many programs, both free and paid, that promise to keep your computer safe from threats, but only the best antivirus software delivers on the promise. These programs will scan your system for threats and inform you whenever they detect one. Depending on the severity of the virus, they will either quarantine the infected file or remove it completely to prevent the virus from multiplying.
Some viruses are so destructive that they can wipe all your data and render your hard drive unusable. When they strike, it might be too late to do anything, which is why prevention is important.
With reliable software installed on your computer, no virus will be able to infect your documents and files. To ensure optimal protection, make sure to always use the latest version of the software and to download virus definition updates daily. The best antivirus software will do all of this automatically, allowing you to surf freely without worrying about viruses and other threats to your online safety.
Are you protected?There are over 400 cyber attacks every single minute.
Learn about cybersecurity
What is the Best Antivirus?
What is Antivirus?
What is AdWare?
What is a Botnet?
What is a Computer Exploit?
What is a Computer Virus?
What is a Computer Worm?
What is Cybercrime?
What is a DDoS Attack?
What is Hacking?
What is Identity Theft?
What is a Keylogger?
What is an Online Scam?
What is Malware?
What is Phishing?
What is Ransomware?
What is a Rookit?
What is a Scam?
What is Social Engineering?
What is Spam?
What is Spoofing?
What is Spyware?
What is SQL Injection?
What is a Trojan Horse?
What is a Zero-Day Exploit?
Are you protected?
There are over 400 cyber attacks every single minute. Don’t take chance online.
Disclaimer: SoftwareLab.org is not an antivirus, VPN or hosting service provider and does not endorse the use of the products featured on this website for unlawful means. It is the responsibility of the user to adhere to all applicable laws. We have no control over the third-party websites we link to and they are governed by their own terms and conditions. SoftwareLab.org is supported by advertisement in order to be a free-to-use resource. We strive to keep the information accurate and up-to-date, but cannot guarantee that it is always the case.