Viruses that Invade Your Computer Even After Having Antivirus

Surfing the Internet every day is like going out on the street, so we expose ourselves to various dangers that circulate on the Internet, camouflaged in various presentations. Worm or Trojan names may sound familiar to us, but we do not know their true impact as computer viruses.


Viruses that Invade Your Computer | Free Antivirus


There are different types of computer viruses and classifications. Computer viruses can affect replication goals and techniques. The best known are:

Resident Virus:

They are those that are inserted into the computer's RAM memory, as part of the operating system when they are executed. They are difficult to identify and eliminate. They overwrite and break code and other functions.

Non-Memory Resident Virus:

When it runs it scans the disk for targets and infects them, then it goes away. That is, it does not stay in memory after it runs.

Direct-Acting Virus:

They remain inactive on a computer until the file containing the virus runs. Its target is a specific type of file, usually executables or .exe. They are easy to detect and remove.

Boot Virus or Boot Sector:

They hide in files on USB sticks, in email attachments, CDs or DVDs. They get their name because they are activated when the computer reads one of these devices and thus infects the hard disk. They may require system formatting because they infect the disks containing the files.

Multipartite Viruses:

This is another type of virus that invades your computer, infects and spreads in different ways. They affect program files and system sectors at the same time. They perform unauthorized actions on the operating system, files, and programs.

Polymorphic Viruses:

They can alter your code when replicated, therefore they are difficult to detect. 

Overwrite Virus:

They spread through emails and delete all the files they infect. They write within the content of the file, which makes the files partially or completely useless.

Macro-Virus or Document Virus:

This virus is written in a language framework, embedded in documents so that when people open a file that they receive in the mail, the virus code runs and infects the computer. That is why you should not open files in suspicious emails. 

Email Virus:

They are those who intentionally use email systems to expand. They are aware of the functions of the mail system. They generally target one type of system, such as Microsoft Outlook.

 

They collect email addresses from various sources and can attach copies of themselves to all emails sent. Or they can also generate emails that contain copies of themselves as attachments. Apart from the types of viruses that invade your computer, we must also mention malware, which is another classification of files that damage our computers.


Other Types of Malware or Malicious Programs:

We already mentioned that the term malware can be confused with a virus. In general, these affect many computers, so we decided to include them in this list as well.

Trojans

Trojans are the most famous group of malware out there. Their strength lies in the fact that they achieve a level of camouflage that may go unnoticed by some versions of antivirus, such as a regular program or a utility. It is frequently used by programmers and is housed in various applications and files in the operating system. Mobile versions have even been created, where its effect can be much more lethal. It is linked to questionable email attachments and unofficial license programs. It is fought with antivirus and anti trojan.

Worms

It can generate automatic replicas and travel through all existing network systems, both internal and external. Even, It is controlled with free antivirus and firewall.

It uses a host computer to scan and then infect other computers. They differ from viruses in that they cause some damage to the network or consume bandwidth. While viruses corrupt or modify files.

Spyware

It is a more specialized class of malware since it is basically spyware. Its objective is to steal all the information from your computer and pass it on to its owner. It is one of the main avenues for the success of cybercrime. They are used mainly to steal information and store the movements of users on the web and show pop-ups to users. Some spyware is intentionally placed on corporate or public computers to monitor users.

 

They can collect data of any kind, such as online browsing habits, passwords, banking information, among others.

Rogueware

It is a fake antivirus that is offered to us as a solution to detected threats. It is present in various environments for illegal downloading of files, adult content, free programs, etc. It acts by simulating that it does a scanner of our computer and disinfects the equipment when in reality it is doing the opposite.

Ransomware

This type of malware is much more specialized than the previous ones. It threatens to publish the victim's data or forever block access to their computer unless a fee is paid. Hence the translation of the name is data hijacking.

 

The most advanced techniques are cryptovirus extortion, which encrypts the victim's files making them inaccessible. If done right, it is impossible to crack that key. They are carried out using Trojans, which look like legitimate files.

Keylogger

It is aimed at recording, capturing and collecting all the keyboard movements performed by you regularly. They are accompanied by Trojans and can be installed not only digitally, but also through devices. Their goal is to steal information and blackmail.

Comments