What name is given to a type of virus that uses a number of techniques to conceal itself from the user or detection software?

Skip to content

9 Common Types of Computer Viruses

Share This Blog

Share This Blog

No one enjoys being sick. When you’re suffering from a cold, there’s no way you can operate at 100%

It might sound silly, but your computer can catch a cold just like you. OK, maybe not exactly like you—you won’t give your computer a virus by sneezing on your keyboard, but there are similarities.

Computer viruses have the “virus” name because they resemble illnesses in the way they infect a system. Doctors can usually diagnose a virus based on symptoms exhibited by the body. IT professionals can do the same with computers. Typical signs of computer virus infections include:

  • Ongoing crashes and blue screen errors
  • Slow performance
  • Missing files
  • Low storage
  • Unexpected behavior
  • Constant browser pop-ups
  • Unidentifiable programs
  • Increased network activity
  • Disabled security software

How Do You Catch Computer Viruses?

Most people know how to prepare for cold and flu season: wash your hands, cover your mouth when you cough, cover your nose when you sneeze, get plenty of rest, and avoid people who might be sick. It’s something we learn from a young age.

We know to take these precautions, because we know how humans contract viruses. In the same vein, when you understand how viruses infect computers, you can take better preventative measures to prevent viruses and identify a virus before it rages out of control.

Here, we illustrate how you can recognize nine common computer viruses.

Computer Virus Statistics

  • Ransomware Attacks and Data Recovery. In a survey of 5,400 IT decision-makers, Sophos found that “on average, ransom-payers got back just 65% of the encrypted data, leaving more than a third inaccessible, while 29% said they got only half of the data back.” Learn more about ransomware.
  • Costs of Cyberattacks. According to IBM, the average cost of a data breach in the United States is $3.86 million. It takes 280 days on average to identify and contain a breach.
  • Repeat Computer Viruses. In a survey of 1,300 security professionals, Cybereason found that 4 in 5 businesses that chose to pay ransoms suffered a second ransomware attack.
  • Computer Virus-Related Identity Theft. In 2020, the FTC received about 1.4 million reports of identity theft, double the number from 2019.

Common Types of Computer Viruses

1. Resident Virus

Resident viruses set up shop in your RAM and meddle with your system operations. They’re so sneaky that they can even attach themselves to your anti-virus software files.

2. Multipartite Virus

This virus infects the entire system – multipartite viruses spread by performing unauthorized actions on your operating system, folders, and programs.

3. Direct Action

This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Due to its targeted nature, this virus type is one of the easier ones to detect and remove.

4. Browser Hijacker

Easily detected, this virus type infects your browser and redirects you to malicious websites.

5. Overwrite Virus

As the name implies, overwrite viruses overwrite file content to infect entire folders, files, and programs.

6. Web Scripting Virus

This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems when users download malicious files or visit malicious websites.

7. File Infector

By targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

8. Network Virus

Network viruses travel through network connections and replicate themselves through shared resources.

9. Boot Sector Virus

One of the easier viruses to avoid, this virus hides out in a file on a USB drive or email attachment. When activated, it can infect the system’s master boot record to damage the system.

How to Protect Yourself From Computer Viruses

The key to protecting yourself from computer viruses is having multiple layers of cybersecurity defense. Having a firewall or anti-virus is a great start, but it isn’t a comprehensive solution. There are multiple layers to consider in a cybersecurity plan, like user education, endpoint detection and response (EDR), DNS filtering, and more. Learn more about the 11 layers of cybersecurity.

Your individual solution will depend on factors like the size of your business, industry, organization type, and long-term business goals. The easiest way to illustrate multilayered computer virus protection, is by imagining each individual layer of cybersecurity as a slice of swiss cheese. Each slice has a few holes in it, and as you stack slices on top of one another, you cover up the holes. Download the Essential Business Guide to Cybersecurity.

Is it Time to Evaluate Your Business’s Cybersecurity Strategy?

Have you been noticing symptoms of a computer virus lately? Are you looking to reevaluate your current cybersecurity solution? We can help.

Related Blogs

  • What Is Ransomware?
  • Building Your Cybersecurity Castle
  • 6 Elements Every High-Performing Website Needs
  • Frequently Asked Questions: Cybersecurity.
  • We Don’t (Always) Play Nice in the Sandbox.

Categories

  • Awards
  • Case Study
  • Company History
  • Employee Recognitions
  • Employee Spotlight
  • Event
  • In Remembrance
  • In the Community
  • In the Media
  • Products & Services
    • Business Communications
    • IT Solutions
    • Software Solutions
    • Website Services
  • Securing Your Business
  • Testimonial – Business Communications
  • Testimonial – Corpus
  • Testimonial – Dallas
  • Testimonial – Denver
  • Testimonial – IT Solutions
  • Testimonial – Kansas City
  • Testimonial – San Antonio
  • Testimonial – Software Solutions
  • Testimonial – Website Services
  • Testimonial – Wichita
  • Vendor Partners

Categories and Tags:

Categories: IT Solutions, Products & Services, Securing Your BusinessTags: blue screen error, boot sector virus, browser hijacker, common computer viruses, CyberSecurity, direct action, file infector, missing files, multipartite virus, network virus, overwrite virus, resident virus, web scripting virus

BRINGING THE HUMAN TOUCH TO TECHNOLOGY.

We help make IT, Software, Websites, and Communications easier.

Page load link

This website uses cookies to enhance your experience. By continuing on our website, you consent to our use of cookies. For more information, read our Privacy Policy.

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.

Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.

CookieDurationDescription
cookielawinfo-checkbox-analytics 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional 11 months The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary 11 months This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy 11 months The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

Go to Top

What is the name for a type of virus which infiltrates a piece of software disguising itself as something else?

Trojan Horses Just as it sounds, a Trojan Horse is a malicious program that disguises itself as a legitimate file.

Which of the following types of viruses uses one or more techniques to hide itself and try to avoid detection by antivirus software?

A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.

What the different techniques to protect your devices from viruses?

Keep your device secure.
Keep up-to-date. Update your system, browser, and important apps regularly, taking advantage of automatic updating when it's available. ... .
Antivirus software. ... .
Antispyware software. ... .
Firewalls. ... .
Choose strong passwords. ... .
Use stronger authentication. ... .
Be careful what you click. ... .
Shop safely..

What are the 4 types of virus in computer?

Types of Computer Viruses.
Boot Sector Virus. Your computer drive has a sector solely responsible for pointing to the operating system so that it can boot into the interface. ... .
Web Scripting Virus. ... .
Browser Hijacker. ... .
Resident Virus..