How does a computer get infected with a virus or spyware?

Updated: 11/13/2018 by Computer Hope

Computer VirusThere are dozens of ways a computer can become infected with spyware, viruses, and malware. Below is a list of methods of how your computer can become infected. We've made this list in the order we believe to be most to least common.

Accepting without reading

By far, one of the most common ways a computer becomes infected is when a user accepts what they see on the screen without reading the prompt before proceeding. For instance:

  1. While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you're getting, you accept the prompt.
  2. When installing or updating a program, you're often asked if you want "additional software" to be installed. Often, this option is presented as a check box, which is already checked. So, if you simply click "Next" or "OK," the program considers that as permission, and installs the software — whether you want it or not. For this reason, you should be very careful when installing software. Make sure to read everything on every screen of the installation process before clicking any buttons.

Tip: When installing a program, you are given the options between an automatic and custom install. If you are installing something from the Internet, we suggest doing a custom install to make sure nothing else is added or changed during the install.

Downloading any infected software

DownloadWhen downloading any software (programs, utilities, games, updates, demos, etc.) via the Internet, make sure you're downloading the software from a reliable source. Be sure to run your downloads through your antivirus and spyware scanners upon completion. As we stated in a previous section, during the installation process, read all prompts about what the program is installing on your computer.

Tip: You can help verify if a website is reliable by using tools such as WOT.

Opening e-mail attachments

As a general rule, do not open e-mail you were not expecting to receive. Computers can become infected when users open e-mail attachments that contain malicious code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.

Inserting or connecting an infected disk, disc, or drive

Any disk, disc, or thumb drive connected or inserted into your computer can be infected with a virus. As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus or trojan horse.

Note: This same rule applies to any networked drive or computer. If another computer has write access to your computer or a drive accessible by your computer, a virus can move between computers on a network.

Visiting unknown links

HyperlinkAnyone, anywhere can create a website. This is great for humanity as an intelligent, creative, social species. But, it also means that any malicious person, anywhere, can create a website. You should be aware of this when you visit a website for the first time, and you're not sure what it is.

A malicious website may have the capability to read files on your computer, transfer malicious files to you, or access your sensitive information. Always be cautious, and beware of any link you receive in chat, e-mail, or SMS.

Note: A tactic commonly used with phishing is to make a link look like a legitimate link, but redirect you to a different page or may closely resemble a legitimate URL.

Not running the latest updates

Many of the updates, especially those associated with Microsoft Windows, are security oriented. Always keep your operating system and programs up-to-date. The plug-ins associated with your browser can also contain security vulnerabilities. To make sure you have the latest versions, run the Computer Hope tool to check installed plug-ins and their versions.

Pirating software, music, or movies

Software piracyIf you or someone on your computer is connected to a file distribution network such as BitTorrent, and copyrighted music, movies, or software is downloaded or shared, you may be at risk. Sometimes these files and programs contain viruses, spyware, trojans, or malicious software in addition to what you believe you are downloading.

No antivirus spyware scanner

If you're running a computer with Microsoft Windows, we highly recommended you have some form of antivirus and spyware or malware protection. This software can remove any existing viruses and spyware, and it helps prevent future infections.