What are computer viruses?
Computer Viruses (also called “malicious programs,” “malware,” etc.) are small computer program parts that trigger unwanted actions and can have a wide variety of effects on your computer system:
So the range is wide. Around a thousand new viruses are released every day. The damage
caused by viruses has long been in the millions.
The generic term “malware” (“mal” = English for “damaging”) is often used for all types of viruses. A distinction is made between different types of malware or viruses:
File viruses:
File viruses represent the classic form of a computer virus. They attack certain files, such as executable programs, and multiply when these program files are called.
Trojan horses:
So-called “trojans” are used to smuggle other malicious programs, such as bots, onto your computer, for example, to spy on data and passwords, to open the system unnoticed for access from outside, to use your computer for attacks on other systems, or your Encrypt data and then blackmail you.
Worms:
The “worm” type of virus is an independent, self-replicating program that prefers to spread in networks and tries to disrupt its work. Their risk potential is comparable to that of file viruses and Trojan horses.
Bots:
Bots (an abbreviation for “robots”) are independently working computer programs that are active without the user having to do anything. This is problematic if they act in secret. A bot “hidden” in the PC will attack websites or “steal” data on your computer.
Hoax:
A hoax is not a virus but a kind of “bad joke,” often in the form of a chain letter. You can see an example of a chain letter in the upper left corner.
Only when it is passed on to others does the intended effect of a “virus” unfold, namely the “automatic” mass spread. Chain letters are mainly found in social networks.
Possible damage from virus infection
Depending on the virus, the damage caused is very different. In the past, the main aim of the attack was to disrupt system functions, e.g., by:
Viruses usually target unwanted actions, such as secretly sending spam e-mails. It is often also about spying on data or using the computer as a platform for attacks on other systems (so-called denial of service attacks).
Computer Viruses can be dangerous when they sneak in unnoticed and, for example, spy on the system and authority network for internal information unnoticed for weeks or months. Supposedly unimportant jobs like clerical processing are also affected as a “gateway.”
Some Trojans claim that your computer has been used for illegal purposes by displaying a large image. The Federal Criminal Police Office blocked him and could release him again against a “fine payment.”
Some Trojans encrypt your hard drive and demand “ransom.” The only thing that often helps is setting up the computer from scratch. Still, other programs misuse your computer to use its computing power without being asked.
Nowadays, people often talk about “botnets” and “hijacked” computers or “zombies.”
Here is a brief explanation of how this works:
Pathways of infection
Viruses reach their destination in different ways
Some administrations, therefore, close USB sockets on the computer mechanically or by software. Respect this to protect the administration and your devices!
Risks increase with connection to the Internet.
Whenever data is transferred to a computer from outside, there is a risk of virus infection. With the increasing use of the computer as a communication medium, the risk of viruses also increases. Once connected to the Internet, there is a 100% chance of a virus attack.
That means: Without a virus scanner, an infection is practically unavoidable!
The impending damage can be considerable:
As in medicine, “prevention is better than cure.”
Virus attack – what to do?
Don’t panic – keep calm.
If you suspect a virus has crept in, a quick reaction is required to avoid greater damage.
It is important:
The success of a company also depends on the quality of customer experiences. However, many…
Whether it's Amazon, Apple, Google, or Microsoft, each big tech giant wants to claim the…
Companies are currently implementing various sustainability measures. However, internal IT is rarely considered. The new…
AI can help companies save valuable resources by uncovering optimization potential. Using self-learning algorithms, it…
More and more companies in the finance sector are facing considerable challenges with cloud transformation.…
The number of cyber attacks on companies is increasing alarmingly. Every company is affected, and…