Q:

What are the most current computer viruses?

A:

New viruses, worms and Trojan horse programs are identified daily. As of October 2014, McAfee and Bitdefender are two companies, of many, that maintain online virus databases. Three of McAfee's top-tracked viruses originated in 2008, 2009 and 2010. Its website has detailed, up-to-date information on the viruses that are current threats and provides instructions on how to remove them.

Computer viruses infect existing programs. This is similar to the way biological viruses need to insert themselves into a live cell to survive and reproduce. Virus writers identify weaknesses in popular software programs, such as word processing and email applications, and then create a customized virus for it. Software companies must publish frequent updates to combat viruses and address vulnerabilities. Viruses are more prevalent in PCs and Android-based devices than on Macs and iPhones.

Worms and Trojans are similar to viruses in that they seek out vulnerable computers and inflict damage once they gain access. Worms are different from viruses in that they are standalone programs that copy themselves onto other devices. Trojans are programs that appear to be helpful, fun or useful programs but actually act as back doors that allow the virus writer unrestricted access to the infected system.


Is this answer helpful?

Similar Questions

  • Q:

    What is Internet Frog?

    A:

    Internet Frog is a website that provides free resources to test Internet speed, validate email addresses, find locations of IP addresses, and scan computers to check for viruses. Located at InternetFrog.com, the site began in 2005 with one of the first free Internet speed tests.

    Full Answer >
    Filed Under:
  • Q:

    What is computer sabotage?

    A:

    Computer sabotage involves deliberate attacks intended to disable computers or networks for the purpose of disrupting commerce, education and recreation for personal gain, committing espionage, or facilitating criminal conspiracies, such as drug and human trafficking. According to the Federal Bureau of Investigation, computer sabotage costs billions of dollars in legal fees to recover damages such as identity theft and to repair vital infrastructure that serves hospitals, banks and 911 services.

    Full Answer >
    Filed Under:
  • Q:

    Where is the clipboard on my computer?

    A:

    The clipboard on a computer is not a specific software that can be accessed; it is a tool used by the computer to save cut or copied information for pasting to another location. Accessing the clipboard on computers that use Windows Vista, 7 or 8, requires third-party software.

    Full Answer >
    Filed Under:
  • Q:

    How can I tell if my computer is being monitored?

    A:

    Software designed to monitor computer activity can be found under Processes in the Task Manager on a PC. Simply press Ctrl-Alt-Del to bring up the Task Manager. On a Mac, open up Gadgets and Gizmos, and then click Utilities and Activity Monitor to pull up the running processes.

    Full Answer >
    Filed Under:

Explore