ITTB
ITTB
ITTB
A computer virus is a type of malware that, when executed, replicates by inserting its code into
other programs or files on the host system. Computer viruses aim to disrupt systems, cause
major operational issues, and result in data loss and leakage.
(A Virus is a type of malware that when executed, replicates itself by inserting its code
into other programs and can cause either damage or corruption of files rendering them
useless. Computer viruses replicate themselves, spreading through your operating
system and network. At the same time, the virus is wreaking havoc on your computer as
it can damage programs, delete files, and make devastating changes to your hard drive,
all of which can result in reduced performance.)
1. Email Attachments: Malicious files sent via email that activate when opened.
2. Malicious Links: Links leading to infected websites or downloads, often shared through social
media or messaging apps.
3. Mobile Apps: Malware disguised as legitimate apps downloaded from unofficial app stores.
(Computer viruses are a significant threat in our digital world, and they can spread
through various methods an understanding these methods is crucial for effective
cybersecurity.
One common way viruses propagate is through email attachment. Cybercriminals often
send emails with infected files. When a user opens these attachments, the virus is
activated, allowing it to infect the computer.
Another method is through malicious links. These links are often shared on social media
or messaging apps. Clicking on them can lead users to infected websites, which can
automatically download malware onto their devices.
Mobile apps can also be a source of infection. There are fake apps that disguise
themselves as legitimate ones, especially when downloaded from unofficial app stores.
Once installed, they can introduce malware to the device.
1. SLOW PERFORMANCE
EXPLANATION: When a virus enters the computer, this uses a lot of the system’s
resources, making the computer run slower than it normally would. Viruses may also
initiate programs which execute at the background and consume memory as well as CPU
usage. These processes decrease the usable capacity on the existing resources hence
make what should be routine to appear slow. This slow down is usually most noticeable
in launching files, web browsing or starting applications. Even in the best scenario it
might slow down as malware tries to connect to external servers or perform any other
activities.
2. UNEXPECTED POP-UPS
EXPLANATION: Some viruses seize the program such as www, view or the computer, and
open or close on their own. This behavior is a way that is an attempt to interfere with
normal working activities or to create instability in the system. Malware may alter the
functioning of a program in such a way that it is set to start automatically, or do
something else that the user does not want. It could see this with programs which start
up several instances or those that remain open in the background. This unusual behavior
can also be seen when the virus is attempting to avoid the detection of the operating
security program.
EXPLANATION: Some of the viruses are able to access the list of contacts to pass itself
by posting the message from the infected account. They normally convey links or
attachments that contain executable files that seek to infect the computer of the receiver.
Often, people get replies from their contact list asking them questions about some weird
messages that they were sent by them. It's more worrying due to the fact that such
behavior helps in spreading of malware, also it compromises the reputation and privacy.
If the user experience unwanted messages that have been sent from their account it is
always wise to change the passwords and scan the computer for any viruses.
1. Melissa
The Melissa virus was first spotted in March 1999, spreading to the public via internet forums
and emails offering free login credentials to adult websites. The virus was delivered through a
Microsoft Word document with an embedded macro that, when opened, would run a malicious
code. If macros were enabled, Melissa spread itself to the first 50 contacts in a user’s Outlook
address book. Infected devices experienced mass mailings and slowdowns.
("The goal of the virus wasn’t necessarily to steal massive volumes of data but to disrupt
as many computer networks as possible. In fact, Melissa propagated so quickly that it
overwhelmed and shut down the email servers of over 300 major organizations
worldwide. Forensics reports found that at least $80 million was spent recovering from
the global-scale attack")
2. Code red
Code Red was a computer worm designed to exploit major flaws in Microsoft’s Internet
Information Services web server. In July 2001, Code Red reportedly attacked over 350,000 web
servers, defacing web pages with messages like “Hacked by Chinese.”
(This widespread attack was possible because worms self-replicate and spread
themselves to other machines in the same network. The cost of recovery and damages
from this attack was estimated to be $2.75 billion.)
3. ILOVEYOU
ILOVEYOU, also known as the love letter or the LoveBug virus, was first discovered in May
2000. The malware was delivered to millions of users as an email attachment with the subject
line “ILOVEYOU.”
(Once opened, it spread to every contact in a user’s Microsoft Outlook address book and
overwrote certain files (e.g., JPEG and MP3 files) from the hard drive.
Considering how many organizations relied on Outlook for all their email needs at the
time, ILOVEYOU was fairly widespread. According to a retrospective report, the virus
affected over 45 million computers within 10 days, resulting in approximately $10 billion
in damages.)
(When a virus is found, it is better to remove it immediately before it can do more harm.
Antivirus software is created to detect and remove the virus. It remains online to
continuously update its virus library, ensuring it detects new threats as they arise. It
regularly scans your system to identify and remove most viruses, before you even notice
them. You can also scans on specific files or areas of your computer that you suspect
may be infected, like your hard drive.)
(require that your browser asks for permission before loading certain pages or sending
personal information.)
3. Surf Smart
- Visit only trusted websites and verify downloads. ; Avoid sites with non-secure URLs (not
starting with https://).
(If a website's URL begins with "HTTP" instead of "HTTPS" before the domain name, it
lacks proper encryption, this means that any information you enter on the website, such
as passwords, credit card numbers, or personal information, could potentially be
intercepted by a third party.)
(Don’t accept the terms of service for new programs or games without reading them first.
Understand what software or apps will do to your operating system. Don’t automatically
accept terms or allow programs to make changes to your computer without careful
examination)
(One of many ways to insert viruses to our devices is through email or social media
attachments, so if an unknown or suspicious email was sent to you, do not open the link
or better yet delete the email.)
- Research the free software before downloading; check for legitimacy and user
experiences.
(May ibang free software na may nakaattach na virus so mag background check muna to
see if it's legit and safe before downloading)
(many of the new updates specifically address security flaws, it’s essential to allow your
PC to perform updates.)