How does a computer get infected with a virus or spyware?
There are dozens of ways a computer can become infected with spyware, viruses, and other malware. Below is a list of methods of how your computer can become infected. We've made this list in the order we believe to be most to least common.
Accepting without reading
By far one of the most common ways a computer becomes infected is when a user accepts what they see on the screen without reading the prompt before proceeding. For instance:
- While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you're getting, you accept the prompt.
- When installing or updating a program, you're prompted (often check boxes already checked) if it's okay to install additional programs that you may not want or are designed to monitor your usage of the program.
Tip: When installing a program you are given the options between an automatic and custom install. If you are installing something from the Internet, we suggest doing a custom install to make sure nothing else is added or changed during the install.
Downloading any infected software
When downloading any software (programs, utilities, games, updates, demos, etc.) via the Internet, make sure you're downloading the software from a reliable source. Be sure to run your downloads through your antivirus and spyware scanners upon completion. As we stated in a previous section, during the installation process, read all prompts about what the program is installing on your computer.
Tip: You can help verify if a website is reliable by using tools such as WOT.
Opening e-mail attachments
As a general rule, do not open e-mail you were not expecting to receive. Computers can become infected when users open e-mail attachments that contain malicious code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.
Inserting or connecting an infected disk, disc, or drive
Any disk, disc, or thumb drive connected or inserted into your computer can be infected with a virus. As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus or trojan horse.
Note: This same rule applies to any networked drive or computer. If another computer has write access to your computer or a drive accessible by your computer, a virus can move between computers on a network.
Visiting unknown links
It is possible for anyone to create a website and if a malicious person has designed the website it could give them access to your computer, send malicious files, or obtain sensitive information about your computer. Always be cautious and suspicious of any link sent to you over chat, e-mail, or SMS.
Note: A tactic commonly used with phishing is to make a link look like a legitimate link, but redirect you to a different page or may closely resemble a legitimate URL.
Not running the latest updates
Many of the updates, especially those associated with Microsoft Windows, are security oriented. Always keep your operating system and programs up to date. The plug-ins associated with your browser can also contain security vulnerabilities. To make sure you have the latest versions, run the Computer Hope tool to check installed plug-ins and their versions.
Pirating software, music, or movies
If you or someone on your computer is participating in a BitTorrent or other service to unlawfully exchange copyrighted music, movies, or software, you may be at risk. Sometimes these files and programs contain viruses, spyware, trojans, or malicious software in addition to what you believe you are downloading.
No antivirus spyware scanner
If you're running a computer with Microsoft Windows, we highly recommended you have some form of antivirus and spyware or malware protection. This software can remove any existing viruses and spyware, and it helps prevent future infections.