Skip to content

Computer Tip of the Day: Malicious Software

What in the world is a computer virus?

It almost sounds like technical jargon too hard to comprehend. The reality is that computer viruses are only a fraction of what computer users should be concerned about. Viruses fall under the umbrella of a much broader term called malicious software, which is any and all software installed on a computer that does something against the law or against the will of the computer user and usually goes unnoticed.

Unfortunately, many times the software will go unnoticed until it’s too late and something bad has happened as a result of the infected computer. In summary, there’s more to be concerned about than just computer viruses. Before discussing the broader term of malicious software, the definition of a virus will be briefly discussed.

When someone’s computer breaks down or is acting in an odd way, many times, the first thought is something along the lines of, “I’ve got a virus!” However, a malfunctioning computer doesn’t always flag the presence of a virus, and many people can confuse the effects of viruses with a malfunctioning computer. Viruses are actually computer programs written to take advantage of flaws or security “holes” in a computer operating system such as Microsoft Windows or OS X (Macintosh). A software program, commonly called an “app” nowadays, can also contain flaws or security holes in the code that makes up the program.

By far, the most common way a computer is infected with a virus is by a computer user finding and installing a program from the internet that is free and “looks good,” usually hosted on a website that looks friendly.

When the program is installed by the user, the tainted program will install a virus simultaneously, unnoticed by the user. However, as said, there is more than just viruses to be concerned about. Other entities that fall under the umbrella of malicious software are rootkits, worms, and spyware. A rootkit can be installed much the same way as a virus can be, but rootkits are more difficult to detect and sometimes go unnoticed by antivirus software and can require an expert to be rid of. A rootkit will enable a remote hacker to more or less take over and administer a computer.

A computer can obtain a worm by running without firewall protection which protects from other computers on a network; a worm is a self-propagating virus that spreads automatically from computer to computer. Spyware is similar to viruses, but the goal of the spyware programmer is to spy on computer users. The result of infection by any of the said entities is usually a broken down computer or identity theft.

The first line of defense in protecting against malicious software is to use great care and careful judgment when deciding which websites to download and install software from. The next line of defense is typically an antivirus suite installed on the computer. Consulting specialists and obtaining appropriate education can aid as first lines of defense, especially when choosing an antivirus suite to be installed on a computer.

Please contact us for a consultation.

a woman in a business suit is using a laptop

Reliable Network Monitoring Support

Reliable Network Monitoring Support Ensure network security and operational efficiency with robust network monitoring. A strong monitoring system is indispensable

a man holding a computer case with many wires

How to Protect Your Electronics Against Disaster

Know how to protect your business technology and electronics against natural disasters. It’s important for companies to develop a game plan that will ensure employees are able to communicate with others before, during, as well as after a natural disaster to keep the business running.

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.