Computer viruses are one of the users’ biggest fears – both on personal and corporate devices.
This is not a secret.
It is because these malicious programs can bring numerous losses to users, especially companies.
In fact, the different types of viruses we have today are many and growing more and more.
More precisely, 27,000 new malware are created daily, according to a 2017 antivirus study, G Data.
And each of these programs is intended for different purposes but always to harm their targets.
The History Of The Computer Virus
The first computer virus on record was The Creeper, created in 1971.
However, its only action was to display the message: “I’m The Creeper, catch me if you can!”
Since then, viruses have evolved and developed the most diverse functions.
What Is A Computer Virus And What Is Malware?
Probably, if you do a search for computer viruses, you will come across the term malware.
So, the question remains:
Are computer viruses and malware the same thing? Well, the answer is no!
All computer viruses are malware, but not all malware is a computer virus.
This is a standard statement among information security experts.
However, stay calm, we will explain it to you better.
When we talk about computer viruses, we mean malware that is not able to reproduce on its own, but that depends on the user’s action.
However, malware is the term that refers to all types of malicious programs that can damage a device.
Common Types Of Computer Viruses
Take advantage of this article to learn about some of the most popular types of computer viruses.
Better understand their operation, objectives, and how they can affect your business.
# 1 Archive
This type of virus affects exclusively, executable files of the Windows operating system, those with the ending .com or .exe.
However, they only work when the user opens the infected file.
So it is always important to open files only from trusted sources. Especially those that are received by e-mail. Stay tuned!
# 2 Program
Another virus that also affects executable files.
You can change the properties of a program, becoming a kind of clone of the original infected software.
This malware can even prevent the computer from starting.
# 3 Mutant
This is a cunning type of virus, as its properties can impair the detection and removal of this threat through antiviruses.
Each time a program infected by mutant viruses is run, it changes. Also, it has a more sophisticated variation, known as polymorphic.
# 4 Trojan horse (Trojan)
Perhaps the Trojan horse is the most popular on this list, among users. After all, who never feared to get this computer virus and losing their machine?
The intent of this threat is to run without being noticed by the user.
In this way, the malware author can have full access to the computer, monitoring all the victim’s activities on the device.
That is, the user’s data, passwords, files can be viewed and used against him/herself.
Initially, the adware may appear to be a reliable program. However, when installed, they usually check the internet connection to start other malware.
The adware, as its name suggests, makes it easy to display unwanted advertisements on browsers.
In fact, they are also facilitators for the practice of Phishing – a common action among hackers, to collect data from users, through cloned websites.
Already the computer virus in the script is programmed to perform actions without user interaction. In this case, they are divided into two categories:
- VB (programming language);
- JS (made in Java Script).
Therefore, to escape from them, pay attention to files with unknown extensions, they usually carry this type of virus with them.
Often contracted through web pages or e-mail boxes, this virus opens a “back door” – translation of Backdoor into Portuguese – so that hackers can take advantage of your machine.
The virus is released only when the infected file is executed.
In this way, the device will be free for action by violators. In some cases, the machine can even become a “zombie”, corroborating to carry out other attacks on the internet.
Stealth is known as the invisible virus, as it hides right after infesting the computer.
In short, it uses several resources to circumvent systems and pass undetected by antivirus. Usually, it works in conjunction with some malicious script.
This is one of the most devastating types of computer viruses. Boot infects the files responsible for booting the machine’s hard drive.
Such files are essential for the functioning of the operating system. So imagine the damage that this virus can do to your computer.
Its power is such that it can prevent the user from accessing the device itself.
Facebook changes color. News about the death of celebrities. Donation campaigns for the most diverse causes. The internet is full of rumors.
This practice is also interpreted as a computer virus, known as Hoax.
In addition to generating uproar, defaming people, and spreading false statements, this type of virus can hide even more serious threats to your computer.
This is yet another common strategy among hackers to practice Phishing, which we explain above.
This is because, in many cases, these pitfalls are accompanied by links, forms, and pages, to capture user data.
Computer virus attacks on companies increased
In Brazil, for example, the number of security incidents increased by 274% in companies.
This is what the Global Information Security Survey, made available by PwC (Price-Waterhouse-Coopers) in 2016, found.