Viruses

What Is a Computer Virus?

Computer viruses are one of the oldest and most persistent types of threats in the digital world. They are malicious programs designed to disrupt the normal functioning of a device, operating system, or network, usually for negative purposes, including stealing information, or controlling a device remotely.

Try Panda Dome for:Windows | Android | Mac | iOS

Computer virus: what it is and how it affects your device

Just like a biological virus, they spread by inserting themselves into other programs or files and require human interaction (such as opening an infected file) to activate and begin replicating.Once a virus is activated, it can perform a variety of actions, from slowing down the system and displaying annoying messages to deleting important files, installing other malware, or opening backdoors to allow third parties access to the infected device.

What Is the Aim of Computer Viruses?

The aims of viruses vary considerably depending on their design and the intentions of the cybercriminals behind them. In general, computer viruses are designed to:

 

  • Disrupt the functioning of a computer or network, causing errors, crashes, or loss of information.
  • Spy on users to obtain personal or financial data.
  • Serve as a tool for blackmail or extortion, as is the case with ransomware attacks.
  • Participate in botnets to launch massive spam campaigns or distributed denial-of-service (DDoS) attacks.
  • Enable remote access to vulnerable systems without the user's knowledge.

 

Viruses often do not operate alone. They can work in conjunction with other types of malware to maximize the damage or the financial benefits for their creators.

How Do Computer Viruses Spread?

Viruses require human intervention to spread. This may include common actions such as opening an infected email, downloading software from unofficial sites, or using contaminated USB drives. The main infection vectors include:

 

  • Emails with malicious attachments or links. This was the case with the infamous ILOVEYOU virus, which tricked users into believing they had been sent a romantic message.
  • Compromised or malicious websites, which install viruses by exploiting browser vulnerabilities.
  • Pirated software or video game downloads from unofficial sources, which can hide threats such as adware or Trojans. This practice is especially common among younger people.
  • Social media or content-sharing platforms such as YouTube, where cybercriminals post seemingly legitimate links that actually redirect to infected websites.
  • Plug-ins or CMS systems such as WordPress, where unpatched vulnerabilities can allow the injection of malicious code, as happened with the Popup Builder plug-in attack that compromised more than 9,000 websites.

Most Common Types of Computer Viruses

Although in everyday parlance we tend to refer to ‘viruses’, in the world of cybersecurity, it is important to distinguish between different types of threats. Within the group of viruses themselves, there are several types:

 

Resident viruses

These load into a system's memory and remain active to infect new files as they are used.

 

Direct-action viruses

These act immediately after being run, infecting files in the same directory or location.

 

Macro viruses

These are especially common in Microsoft Office documents and take advantage of the program's automated functions to run malicious code.

 

Worms

Although they do not attach themselves to files in the same way as viruses, worms spread on their own through networks or connected devices, generating massive traffic and crashing systems.

 

Trojans

These masquerade as harmless software but, in reality, trojans enable remote access to a system or data theft.

 

Polymorphic viruses

Their code changes each time they replicate in order to evade traditional antivirus software.

Most Common Types of Computer Viruses - Panda Security

How to Protect Yourself Against Computer Viruses

Protecting yourself from viruses is possible, as long as you take a proactive attitude. These are some of the good practices recommended by Panda Security:

 

  • Install a comprehensive security solution, such as Panda Dome, which provides real-time protection, cloud-based scanning, and proactive threat detection.
  • Keep your operating system and other programs up to date. This includes plug-ins, browsers, and CMS platforms such as WordPress.
  • Don’t open suspicious emails, especially if they contain attachments or links.
  • Don’t download software from unofficial sources or P2P file-sharing sites.
  • Make regular backup copies, which will allow you to restore your system in the event of a severe infection.

What to Do If Your Device is Infected

If you suspect your computer or mobile device is infected with a virus, the first step is to act quickly. Here's a basic guide on what to do:

 

  1. Disconnect your device from the Internet to prevent the infection spreading further or an attacker gaining remote access.
  2. Run a full scan with your antivirus. You can use specialized Panda Security tools to remove specific threats.
  3. Manually scan your system for unknown applications or unusual processes.
  4. Restore files from backup copies if the infection has damaged important documents.
  5. Change all your passwords, especially if you think the virus might have captured them using a keylogger.
  6. Contact your security provider's technical support services. Panda Security Support.
What to Do If Your Device is Infected - Panda Security
Viruses FAQs
What Is the Difference Between a Virus and Malware?
A virus is a type of malware. All viruses are malware, but not all malware is a virus. There are other types such as trojans, spyware, ransomware, etc.
Can a Virus Infect a Smartphone?
Yes, especially on Android systems if apps are installed from outside Google Play. Learn more in our guide “How to Know If You Have a Virus on Your Phone and How to Remove It”.
Can iPhones Be Infected with Viruses?
Although less common, due to iOS system restrictions, no device is 100% safe. Find out more here.
How Can I Tell If I Have a Virus?

Five tell tale signs of a computer infection: unusual slowness, pop-ups, system crashes, unusually high resource usage, and changes to the home page.

Need help?

Call us 24 hours a day, 7 days a week, and get a free diagnosis.

Additional resources

Digital security is everyone's responsibility. With the right information and tools, you can reduce risks and use the Internet with peace of mind. Explore our guides and protect your online privacy.