{"id":4351,"date":"2017-09-20T00:48:50","date_gmt":"2017-09-20T06:18:50","guid":{"rendered":"http:\/\/news.filepuma.com\/?p=4351"},"modified":"2024-06-18T04:58:56","modified_gmt":"2024-06-18T11:58:56","slug":"how-does-a-computer-get-infected-with-viruses-spyware-or-malware","status":"publish","type":"post","link":"https:\/\/www.filepuma.com\/reviews\/how-does-a-computer-get-infected-with-viruses-spyware-or-malware\/","title":{"rendered":"How Does a Computer Get Infected with Viruses, Spyware or Malware?"},"content":{"rendered":"<p style=\"text-align: justify\"><span style=\"color: #333333\">There are dozens of ways a computer get\u00a0infected with spyware, viruses, or\u00a0malware.\u00a0The constant use of Internet has increased the risk of infection by viruses and malware, leading to potential data loss and identity theft.\u00a0Every internet user should be versed in how to prevent virus infection. Armed with the knowledge to avoid getting and spreading virus infections, you&#8217;ll not only make the internet safer for yourself, but for everyone else you connect with.<\/span><\/p>\n<h3 style=\"font-weight: 400;color: #2a70d0\"><span style=\"color: #333333\"><strong>No antivirus scanner<\/strong><\/span><\/h3>\n<p class=\"tab\" style=\"color: #454545;text-align: justify\"><span style=\"color: #333333\">If you&#8217;re running a computer with Microsoft Windows, we highly recommended you have some form of\u00a0<strong><a href=\"http:\/\/www.filepuma.com\/software\/antivirus-8\/?f=cc\" target=\"_blank\" rel=\"noopener\">antivirus<\/a><\/strong>,\u00a0<strong><a href=\"http:\/\/www.filepuma.com\/software\/spyware_removers-9\/?f=cc\" target=\"_blank\" rel=\"noopener\">spyware or malware<\/a><\/strong> protection. This software can remove any existing viruses or\u00a0spyware, and it helps prevent future infections.<\/span><\/p>\n<h3><span style=\"color: #333333\"><strong>Accept without reading<\/strong><\/span><\/h3>\n<p class=\"tab\" style=\"color: #454545;text-align: justify\"><span style=\"color: #333333\">One of the most common ways a computer becomes infected is when a user accepts what they see on the screen without reading the prompt before proceeding.\u00a0<\/span><\/p>\n<ul style=\"text-align: justify\">\n<li style=\"font-weight: 400\"><span style=\"color: #333333\">While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you&#8217;re getting, you accept the prompt.<\/span><\/li>\n<li style=\"font-weight: 400\"><span>When installing or updating a program, you&#8217;re prompted (often check boxes already checked) if it&#8217;s okay to install additional programs that you may not want or are designed to <\/span>monitor your usage of the program.<\/li>\n<\/ul>\n<p class=\"dtab\"><span class=\"tips\" style=\"font-weight: bold\">Note:<\/span>\u00a0When installing a program you are given the options between an automatic and custom install. If you are installing something from the Internet, we suggest doing a custom install to make sure nothing else is added or changed during the install.<\/p>\n<h3><span style=\"color: #333333\"><strong>Download the\u00a0infected software\u00a0<\/strong><\/span><\/h3>\n<p class=\"tab\" style=\"text-align: justify\">When downloading\u00a0any software (programs, utilities, games, updates, demos, etc.) via the Internet, make sure you&#8217;re downloading the software from a reliable source. Be sure to run your downloads through your\u00a0antivirus\u00a0and spyware scanners upon completion. <span style=\"color: #333333\">As we stated in a previous section, during the installation process, read all prompts about what the program is installing on your computer.<\/span><\/p>\n<h3 style=\"font-weight: 400;color: #2a70d0;text-align: justify\"><span style=\"color: #333333\"><strong>Open email attachments<\/strong><\/span><\/h3>\n<p class=\"tab\"><span style=\"color: #333333\">Don&#8217;t open the email you were not expecting to receive. Computers can become infected when users open email attachments\u00a0that contain malicious\u00a0code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.<\/span><\/p>\n<h3 style=\"font-weight: 400;color: #2a70d0\"><span style=\"color: #333333\"><strong>Visit unknown links<\/strong><\/span><\/h3>\n<p class=\"tab\" style=\"text-align: justify\"><span style=\"color: #333333\">It is possible for anyone to create a website and if a malicious person has designed the website it could give them access to your computer, send malicious files, or obtain sensitive information about your computer. Always be cautious and suspicious of any link\u00a0sent to you over chat, e-mail, or SMS.<\/span><\/p>\n<h3 style=\"font-weight: 400;color: #2a70d0\"><span style=\"color: #333333\"><strong>Pirat software, music, or movies<\/strong><\/span><\/h3>\n<p class=\"tab\"><span style=\"color: #333333\">If you or someone on your computer is participating in unlawfully exchange copyrighted music, movies, or software, you<\/span> <span style=\"color: #333333\">may be at risk. Sometimes these files and programs contain viruses, spyware, trojans, or malicious software in addition to what you believe you are\u00a0downloading.<\/span><\/p>\n<h3 style=\"font-weight: 400;color: #2a70d0\"><span style=\"color: #333333\"><strong>Insert or connect an infected disk, disc, or drive<\/strong><\/span><\/h3>\n<p class=\"tab\"><span style=\"color: #333333\">Any\u00a0disk,\u00a0disc, or\u00a0thumb drive\u00a0connected or inserted into your computer can be infected with a virus. As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus or\u00a0trojan horse.<\/span><\/p>\n<h3 style=\"font-weight: 400;color: #2a70d0\"><span style=\"color: #333333\"><strong>Not run the latest updates<\/strong><\/span><\/h3>\n<p class=\"tab\" style=\"text-align: justify\"><span style=\"color: #333333\">Many of the updates, especially those associated with Microsoft Windows, are security oriented. Always keep your operating system and programs up to date. The plug-ins associated with your browser can also contain security vulnerabilities. To make sure you have the latest versions,\u00a0run the Computer Hope tool\u00a0to check installed plug-ins and their versions.<\/span><\/p>\n<p class=\"tab\" style=\"text-align: justify\">\n<p class=\"tab\">\n<p class=\"tab\" style=\"text-align: justify\">\n<p class=\"tab\">\n","protected":false},"excerpt":{"rendered":"<p>There are dozens of ways a computer get\u00a0infected with spyware, viruses, or\u00a0malware.\u00a0The constant use of Internet has increased the risk of infection by viruses and malware, leading to potential data loss and identity theft.\u00a0Every internet user should be versed in how to prevent virus infection. Armed with the knowledge to avoid getting and spreading virus [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4351","post","type-post","status-publish","format-standard","hentry","category-security-firewalls"],"_links":{"self":[{"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/posts\/4351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/comments?post=4351"}],"version-history":[{"count":1,"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/posts\/4351\/revisions"}],"predecessor-version":[{"id":4845,"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/posts\/4351\/revisions\/4845"}],"wp:attachment":[{"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/media?parent=4351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/categories?post=4351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filepuma.com\/reviews\/wp-json\/wp\/v2\/tags?post=4351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}