A computer virus is a type of malware that can replicate itself, spreading to infect new systems. However, unlike a computer worm, viruses require human interaction to replicate.
Computer viruses are notable for the fact that they attach themselves to other programs. After the virus malware has attached itself to an executable, the malicious code is run whenever the legitimate executable is run. The virus propagates by attaching itself to additional files and programs. By attaching itself to files that move from one computer to another — such as an attachment to an email or a file that is located on a shared storage drive or removable media — the virus can spread itself to other machines.
A virus’s replication mechanism is only the means by which it moves to infect additional systems. The malware also will include some other type of malicious functionality. For example, a virus may act as an infostealer, encrypt data as ransomware, or provide a backdoor via which an attacker can access an infected system.
Computer viruses attach themselves to files, and come along for the ride when these files move from place to place. Some of the common mechanisms that computer viruses use to spread themselves to new computers include:
Viruses come in various different forms. Some of the common types of viruses include the following:
The terms malware and virus are often used interchangeably to refer to software that infects a computer and performs some malicious actions. However, while all viruses are malware, not all malware are viruses. Viruses are distinctive because they infect other, legitimate files with malicious code. Other types of malware exist, including malware that is spread as standalone, fully-malicious executables.
Computer viruses can pose a significant threat to an organization’s endpoint security. Some best practices that an organization can implement to mitigate this threat and protect itself against computer virus infections include the following:
Since a computer virus is a type of malware, a strong endpoint security solution is one of the best ways to protect against malware. An EDR solution can identify the presence of a virus on a device and its attempts to spread and take action to eradicate the infection.
Check Point Harmony Endpoint provides comprehensive protection against computer viruses, other malware, and other threats to the security of an organization and its endpoints. To learn more about how Harmony Endpoint can enhance your organization’s endpoint security posture, feel free to sign up for a free demo today.