{"id":19329,"date":"2016-07-05T10:20:02","date_gmt":"2016-07-05T16:20:02","guid":{"rendered":"https://www.webroot.com/blog/?p=19329"},"modified":"2018-10-05T14:16:15","modified_gmt":"2018-10-05T20:16:15","slug":"what-is-a-computer-virus-2","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/07\/05\/what-is-a-computer-virus-2\/","title":{"rendered":"Computer Virus 101"},"content":{"rendered":"<h2>What is a computer virus?<\/h2>\n<p>Think of a biological virus \u2013 the kind that makes you sick. It\u2019s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar. Designed to relentlessly replicate, these threats\u00a0infect your programs and files, alter the way your computer operates or stop it from working altogether. It\u2019s estimated that the &#8216;Conficker&#8217; malware\u00a0infected more than 10 million computers in 2009, which was a massive amount back then.<\/p>\n<p>The amount of viruses and their capability to inflict damage have only increased since then. Today,\u00a0hundreds of thousands of them\u00a0operate over the internet, and new variants are discovered every day. When you couple this with the discoveries of mass-scale security flaws\/vulnerabilities\u00a0(such as <a href=\"https:\/\/www.webroot.com\/blog\/2015\/09\/17\/heartbleed-continues-to-put-devices-at-risk\/\">&#8216;Heartbleed&#8217;<\/a> and <a href=\"https:\/\/www.webroot.com\/blog\/2014\/09\/29\/bash-shellshocks-internet-heres-know\/\">&#8216;Bash&#8217;<\/a> in 2014), the cyber-world really starts to look like a scary place. It is. But that doesn&#8217;t mean there&#8217;s nothing you can do to protect yourself and your devices.<\/p>\n<h2>How does it\u00a0find me?<\/h2>\n<p>Even if you\u2019re careful, you can pick one up through normal online activities like:<\/p>\n<ul>\n<li>Sharing music, files or photos with other users<\/li>\n<li>Visiting an infected\u00a0website<\/li>\n<li>Opening spam email\u00a0or an email attachment<\/li>\n<li>Downloading free games, toolbars, media players and other system utilities<\/li>\n<li>Installing mainstream software applications without fully reading license agreements<\/li>\n<\/ul>\n<h2>What does it do?<\/h2>\n<p>Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful versions\u00a0can significantly disrupt your system\u2019s performance, sapping computer memory and causing frequent computer crashes.<\/p>\n<h2>What are the symptoms?<\/h2>\n<p>Your computer may be infected if you recognize any of these malware\u00a0symptoms:<\/p>\n<ul>\n<li>Slow computer performance<\/li>\n<li>Erratic computer behavior<\/li>\n<li>Unexplained data loss<\/li>\n<li>Frequent computer crashes<\/li>\n<\/ul>\n<h2>Arming yourself with the best protection<\/h2>\n<p>When you arm yourself with information and resources, you\u2019re wiser about computer security threats and less vulnerable to threat tactics. Take these steps to safeguard your PC with the best protection:<\/p>\n<div class=\"callout-bot\">\n<div class=\"callout-top\">\n<div class=\"callout-mid\">\n<h3>Make sure that you have the best <a href=\"https:\/\/www.webroot.com\/us\/en\/home\">security software<\/a> products installed on your computer:<\/h3>\n<ul>\n<li>Use <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">anti-virus<\/a> protection and a firewall<\/li>\n<li>Get anti-spyware software<\/li>\n<li>Always keep your anti-virus protection and anti-spyware software up-to-date (Webroot SecureAnywhere updates automatically)<\/li>\n<li>Update your operating system regularly (most update automatically)<\/li>\n<li>Increase your browser security settings<\/li>\n<li>Avoid questionable\u00a0websites<\/li>\n<li>Only download software from sites you trust and carefully evaluate free software and file-sharing applications before downloading them<\/li>\n<\/ul>\n<p><strong>Practice safe email protocol:<\/strong><\/p>\n<ul>\n<li>Don&#8217;t open messages from unknown senders<\/li>\n<li>Immediately delete messages you suspect to be spam<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<p>An unprotected computer is like an open door for malware. Firewalls monitor Internet traffic in and out of your computer and hide your PC from online scammers looking for easy targets. Products like Webroot SecureAnywhere Complete\u00a0provide total\u00a0protection from the most dangerous threats out there, thwarting them before they can enter your PC, and standing guard at every possible entrance of your computer to\u00a0fend off any malware\u00a0that tries to enter, even the most damaging and devious strains.<\/p>\n<p>While free anti-virus software is\u00a0available, it simply\u00a0can&#8217;t offer the consistent protection that\u00a0you need to keep up with the continuous onslaught of new strains. Previously undetected forms of can often do the most damage, so it\u2019s critical to have up-to-the-minute protection that won&#8217;t take a break to update and miss the oncoming threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a computer virus? Think of a biological virus \u2013 the kind that makes you sick. It\u2019s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar. Designed to relentlessly replicate, these threats\u00a0infect your programs and files, alter the way your [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17404,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005,2985],"tags":[],"yst_prominent_words":[3463,3461,3473,3453,3459,3455,3493,5297,3457,3451,3487,3477,4247,3469,3479,3467,3481,4981,3475,3465],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19329"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=19329"}],"version-history":[{"count":7,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19329\/revisions"}],"predecessor-version":[{"id":25893,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19329\/revisions\/25893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17404"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=19329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=19329"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=19329"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=19329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}