Types of Viruses

14xdvueImage retrieved from Michael Pekker’s Blog 27 Malware Types and Their Characteristics

In the last post I talked about the different types of cyberattacks that anyone can fall victim to. In this week’s post I am going to focus more on the types of viruses and malicious codes that can attack your computer. As previously mentioned in the last post according to Pennsylvania State University’s blog, “Viruses replicate themselves, and they survive by attaching to other programs or files.” Since the viruses are able to replicate themselves, this can allow them to remain dormant until they actually cause harm to one’s computer software. Viruses that disguise themselves as harmless files tend to be hard to detect. A virus that is good at disguising itself as a harmless file is the Trojan horse. The Trojan horse virus is well known with computer users, but there are many other viruses that can affect ones computer.

There are a lot of computer viruses out there can harm your computer and can steal important information if they are not taken care of quickly. The common types of viruses are boot sector, program, multipartite, stealth, macro, etc. Some of the mentioned viruses are common with the average computer user, but others typically have not been detected. To go into more detail with the viruses mentioned, boot sector viruses “often spread to other computers by the use of shared infected disks and pirated software applications” (Spamlaws). The most common way to rid a computer of the boot sector virus is having an anti-virus program installed on a computer. The program virus is like the common computer virus. Once it is open it will duplicate itself and begin infecting programs on a computer. Other forms of viruses are when two separate viruses come together and form a new one like the multipartite. The multipartite virus is made up of both the boot sector virus and program virus. The main objective of the multipartite virus is that it “infects program files and when the infected program is active it will affect the boot record” (Spamlaws). The stealth virus does exactly what it sounds like. It disguises itself so it is not detected by anti-virus software. The first computer virus referred to as “Brain” was a stealth virus. Therefore the stealth virus is a very common computer virus. The final virus is the macro virus. With the macro virus, it can become embedded into a document. This type of virus is relatively new so one must make sure that their anti-virus software is up-to-date, so the virus can be detected.

Once your computer becomes infected with a virus it is relatively easy to start seeing symptoms. Typically anti-virus programs help detect and sweep to eliminate them but the ones who are not detected by the spyware programs can cause harm to your computer. Some of the common symptoms one starts to see if their computer has been affected by a virus are computer functions begin to slow down or freeze, the frequent restarting of your computer by itself, and error messages start to show up while using the computer. There are a lot of viruses that can possible harm ones computer, therefore it is important for people to be aware of the different types of viruses out there. In order to protect a computer from the threat of viruses it is important to obtain the proper anti-virus software to defend the computer from future attacks.


Types of attacks. Pennsylvania State University. Retrieved from http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%20Attacks.xhtml

Computer viruses: The types of viruses out there. Spamlaws. Retrieved from http://www.spamlaws.com/virus-types.html


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s