New viruses, worms and Trojan horse programs are identified daily. As of October 2014, McAfee and Bitdefender are two companies, of many, that maintain online virus databases. Three of McAfee's top-tracked viruses originated in 2008, 2009 and 2010. Its website has detailed, up-to-date information on the viruses that are current threats and provides instructions on how to remove them.
Computer viruses infect existing programs. This is similar to the way biological viruses need to insert themselves into a live cell to survive and reproduce. Virus writers identify weaknesses in popular software programs, such as word processing and email applications, and then create a customized virus for it. Software companies must publish frequent updates to combat viruses and address vulnerabilities. Viruses are more prevalent in PCs and Android-based devices than on Macs and iPhones.
Worms and Trojans are similar to viruses in that they seek out vulnerable computers and inflict damage once they gain access. Worms are different from viruses in that they are standalone programs that copy themselves onto other devices. Trojans are programs that appear to be helpful, fun or useful programs but actually act as back doors that allow the virus writer unrestricted access to the infected system.Learn More
Search through the Internet history and temporary Internet files on your computer to find what information has been viewed on your computer. Check the browsing history on each separate browser that is in use. Install a monitoring software to see anything that may have been deleted.Full Answer >
The clipboard on a computer is not a specific software that can be accessed; it is a tool used by the computer to save cut or copied information for pasting to another location. Accessing the clipboard on computers that use Windows Vista, 7 or 8, requires third-party software.Full Answer >
Computer sabotage involves deliberate attacks intended to disable computers or networks for the purpose of disrupting commerce, education and recreation for personal gain, committing espionage, or facilitating criminal conspiracies, such as drug and human trafficking. According to the Federal Bureau of Investigation, computer sabotage costs billions of dollars in legal fees to recover damages such as identity theft and to repair vital infrastructure that serves hospitals, banks and 911 services.Full Answer >
According to PC Magazine, the 2014 version of Norton Internet Security is better than McAfee Internet Security 2014. PC Magazine gave Norton four-and-a-half stars, compared to just four for McAfee.Full Answer >