What Is A Computer Virus?
Written by a NortonLifeLock employee
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.
Help protect your digital life on your devices.
Are you afraid of losing your personal information or all the precious things on your computer? Get comprehensive protection with Norton Security Deluxe across all your devices – up to 3 PCs, Macs, smartphones or tablets.
Create an account today and try it free for 30 days on up to 3 of your devices.
In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.
How does a computer virus attack?
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed. This means that a virus can remain dormant on your computer, without showing major sings or symptoms. However, once the virus infects your computer, the virus can infect other computers on the same network. Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of the devastating and irritating things a virus can do.
While some viruses can be playful in intent and effect, others can have profound and damaging effects, such as erasing data or causing permanent damage to your hard disk, and worst yet, some are even design with financial gains in mind.
Toll Group’s Tryst With Ransomware — Australia’s Virus Protection Problem
A great example of how ransomware can obstruct businesses from functioning is The Toll Group’s recent mishap in February, 2020. With their IT systems and business units under attack, the transport company had to halt regular business. In an industry where logistics are affected inadvertently trickles down to smaller businesses — which is exactly what happened with the Toll Group’s customer base. Smaller business owners who were using the transport company suddenly lost the ability to track parcels and shipments. The group ended up missing days of deliveries, disrupting schedules across Australia.
With only a customer service line to help them track their respective packages, Toll Group began to receive harsh criticism. Although it is unknown what preemptive measures Toll Group took in regards to virus protection, they remained transparent through their process of malware removal. It was then discovered by the Australian Cyber Security Centre through samples sent over by Toll Group, that they were attacked by a new variant known as Mailto.
Experts within the field commented on the same, debating if businesses should take into account a more refined approach towards virus protection. In the end, ransomware continues to remain a threat for big and small businesses. Awareness is the first step towards all-round safety — enforcing this knowledge is the next. The attack on Toll Group could just be the first of many; with each attack more targeted towards business systems.
How do computer viruses spread?
In today’s constantly connected world you can contract a computer virus in many ways, some more obvious than others. Viruses can be spread through email and text message attachments, Internet file downloads, social media scam links, and even your mobile devices and smartphones can become infected with mobile viruses through shady App downloads. Viruses can hide disguised as attachments of socially shareable content such as funny images, greeting cards, or audio and video files.
To avoid contact with a virus it’s important to exercise caution when surfing the web, downloading files, and opening links or attachments. As a best practice, never download text or email attachments that you’re not expecting, or files from websites you don’t trust.
How to protect against computer viruses?
As you can see, just like a vicious flu virus, a computer virus is something that you want to avoid. The terms virus and malware are often used interchangeably; however, a virus is one of many types of malware, and only one aspect of the overall threat landscape. As a result, traditional antivirus software alone will not fully protect you from all threats.
Instead, look into comprehensive security software like Norton Security. With patented technologies that work together to outsmart online threats, scanning your system for viruses, and running continuous automatic silent updates, Norton Security keeps you protected from existing, new, and even yet-to-be-invented threats. And if a virus slips through on our watch during your subscription period, Norton support experts will do everything they can to help fix problem at no additional cost. That’s the assurance and peace of mind you only get with our Norton Virus Protection Promise. No other free or paid security software service offers this kind of guarantee.
Isn’t it time to upgrade your security?
Upgrading to new devices and software can often mean downgrading your privacy and security. It’s time to take your security seriously. Download the full version of Norton Security Deluxe free for 30 days, and test-drive it on up to 3 of your devices – PCs, Macs, smartphones or tablets.
Create an account today and be up and running in minutes.
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.