What are the 5 most common ways to get a computer virus?

What are the 5 most common ways to get a computer virus?

Business owners can face threats from anywhere, and with technology advancing protecting your business has never been more critical. Learning

What are the 5 most common ways to get a computer virus?

An innovative team can drive success through creativity, enabling your team to adapt and thrive in any environment. IT departments

What are the 5 most common ways to get a computer virus?

Migrating to the cloud can be an incredible investment for companies looking to optimize performance, improve efficiencies, and provide better

What are the 5 most common ways to get a computer virus?

Managing technology for your business requires you to have IT support in place to help you navigate repairs when they

Updated: 08/02/2019 by Computer Hope

What are the 5 most common ways to get a computer virus?

There are several ways spyware, viruses, worms and malware are transmitted. Below is a list of methods of how your computer can become infected and spread viruses. We've made this list in the order we believe to be most to least common.

Accepting without reading

One of the most common ways a computer becomes infected is when a user accepts what they see on the screen without reading or understanding the prompt. For instance:

  1. While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you're getting, you accept the prompt.
  2. When installing or updating a program, you're often asked if you want "additional software" to be installed. Often, this option is presented as a check box, which is already checked. So, if you click "Next" or "OK," the program considers that as permission, and installs the software — whether you want it or not. For this reason, be very careful when installing software. Make sure to read everything on every screen of the installation process before clicking any buttons.

Tip

When installing a program, you are given the options between an automatic and custom install. If you are installing something from the Internet, we suggest doing a custom install to make sure nothing else is added or changed during the install.

Downloading any infected software

What are the 5 most common ways to get a computer virus?

When downloading any software (programs, utilities, games, updates, demos, etc.) via the Internet, make sure you're downloading the software from a reliable source. Be sure to run your downloads through your antivirus and spyware scanners upon completion. As we stated in a previous section, during the installation process, read all prompts about what the program is installing on your computer.

Tip

Verify if a website is reliable with tools such as WOT.

Opening e-mail attachments

As a general rule, do not open e-mail you were not expecting to receive. Viruses enter the computer when users open e-mail attachments that contain malicious code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.

Inserting or connecting an infected disk, disc, or drive

Any disk, disc, or thumb drive connected or inserted into your computer can be infected with a virus. As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus or trojan horse.

Note

This same rule applies to any networked drive or computer. If another computer has write access to a computer drive accessible by your computer, a virus can move between computers on a network.

  • Can a thumb drive be infected with a virus?
What are the 5 most common ways to get a computer virus?

Anyone, anywhere can create a website, which is great for humanity as an intelligent, creative, social species. But, it also means that any malicious person, anywhere, can create a website. Be aware of this when you visit a website for the first time, and you're not sure what it is.

  • How to create a web page on the Internet.

A malicious website may have the capability to read files on your computer, transfer malicious files to you, or access your sensitive information. Always be cautious, and beware of any link you receive in chat, e-mail, or SMS.

Note

A tactic commonly used with phishing is to make a link look like a legitimate link, but redirect you to a different page or may closely resemble a legitimate URL.

Not running the latest updates

Many of the updates, especially those associated with Microsoft Windows, are security oriented. Always keep your operating system and programs up-to-date. The plug-ins associated with your browser can also contain security vulnerabilities. To make sure you have the latest versions, run the Computer Hope tool to check installed plug-ins and their versions.

  • How to update a Microsoft Windows computer.
What are the 5 most common ways to get a computer virus?

Pirating software, music, or movies

If you or someone on your computer connects to a file distribution network (e.g., BitTorrent), and copyrighted music, movies, or software is downloaded or shared, you may be at risk. Sometimes these files and programs contain viruses, spyware, trojans, or malicious software in addition to what you believe you are downloading.

No antivirus spyware scanner

If you're running a computer with Microsoft Windows, we highly recommended you have some form of antivirus and spyware or malware protection. This software can remove any existing viruses and spyware, and it helps prevent future attacks.

These are some of the most common ways that your devices can get infected with malware.

What are the 5 most common ways to get a computer virus?

Spam emails

Malware authors oftentry to trick you into downloading malicious files. This can be an email with a file attached that tells you it is a receipt for a delivery, a tax refund, or an invoice for a ticket. It might say you have to open the attachment to get the items delivered to you, or to get money.

If you do open the attachment, you'll end up installing malware on your PC.

Sometimes a malicious email will be easy to spot—it could have bad spelling and grammar, or come from an email address you've never seen before. However, these emails can also look like they come from a legitimate business or someone you know. Some malware can hack email accounts and use them to send malicious spam to any contacts they find.

To reduce the chances of your device being infected:

  • If you aren't sure who sent you the email—or something doesn't look quite right—don't open it.

  • Never click an unexpected link in an email. If it appears to come from an organization you trust or do business with, and you think it might be legitimate,open your web browser and go to the organization's web site from your own saved favorite or from an internet search.

  • Don't open an attachment to an email that you weren't expecting, even if it appears to come from somebody you trust.

To learn more, seeProtect yourself from phishing.

Microsoft OneDrive has built-in protection against Ransomware attacks. To learn more, seeRansomware detection and recovering your files.

Malicious Office macros

Microsoft Office includes a powerful scripting language that allows developers to create advanced tools to help you be more productive. Unfortunately, criminals can also use that scripting language to create malicious scripts that install malware or do other bad things.

If you open an Office file and see a notice like this:

What are the 5 most common ways to get a computer virus?

do NOT enable that content unless you're certain you know exactly what it does, even if the file appears to come from somebody you trust.

Warning:A popular trick by criminalsis to tell you that you're about to be charged for a service you never signed up for. When you contact them to protest they tell you that to cancel the service you just need to download an Excel file they provide and fill insome details. If you download and open the fileExcel will show the warning you see above. If you select Enable Content the malicious macro will run and infect your system.

No legitimate company will ever make you open an Office file just to cancel a service. If one asks you to, just hang up on them. It's a scam and there is no service you need to cancel.

To learn more about controlling how macros run on your device seeEnable or disable macros in Office files.

Infected removable drives

Many worms spread by infecting removable drives such as USB flash drives or external hard drives. The malware can be automatically installed when you connect the infected drive to your PC.

There are a couple of things you can do to avoid this type of infection:

First and foremost, be very wary of any USB device that you don't own. If you find a USB device that was apparently lost or discarded, be reluctant to plug it into a computer with data you care about. Sometimes attackers will deliberately leave infected USB devices laying around in popular areas in hopes that somebody will find them and plug them into their computer.

Tip:This is called a "USB drop attack".

If you don't plug it in, you can't get infected. If you find a USB drive just laying around, apparently lost, see if there is a nearby receptionist, or lost-and-found, that you can turn it in to.

Second, if you do plug an unknown removable device into your computer be sure to run a security scan of itimmediately.

Bundled with other software

Some malware can be installed at the same time as other programs that you download. This includes software from third-party websites or files shared through peer-to-peer networks.

Some programs will also install other software that Microsoft detects as potentially unwanted software. This can include toolbars or programs that show you extra ads as you browse the web. Usually you can opt out and not install this extra software by clearing a check box during the installation. Windows Security can help to protect you from potentially unwanted applications. To learn more, seeProtect your PC from potentially unwanted applications.

Programs used to generate software keys (keygens) often install malware at the same time. Microsoft security software finds malware on more than half of PCs with keygens installed.

You can avoid installing malware or potentially unwanted software this way by:

  • Always downloading software from the official vendor's website.

  • Making sure you read exactly what you are installing—don't just click OK.

Hacked or compromised webpages

Malware can use known software vulnerabilities to infect your PC. A vulnerability is like a hole in your software that can give malware access to your PC.

When you go to a website, it can try to use vulnerabilities in your web browser to infect your PC with malware. The website might be malicious or it could be a legitimate website that has been compromised or hacked.

This is why it's extremely important to keep all your software, and especially your web browser, up to date and remove software you don't use. That includes unused browser extensions.

You can reduce your chances of getting malware in this way by using a modern browser, like Microsoft Edge, and keeping it updated.

Tip:Don't want to update your browser because you have too many tabs open? All modern browsers will reopen your tabs after an update process.

Other malware

Some types of malware can download other threats to your PC. Once these threats are installed on your PC they will continue to download more threats.

The best protection from malware and potentially unwanted software is an up-to-date, real-time security product, such as Microsoft Defender Antivirus.