Computer viruses are applications designed for harmful reasons and can infect a device without the owner being aware. Anyone with a device has to be careful of attacks when using their computer, tablet or mobile handset.
Viruses spread through connections to the internet via emails, instant messages and file downloads.
A computer’s hard disk and data storage devices are capable of being infected. Some viruses (also called worms) are capable of copying through connected computers that may not necessarily be connected to the internet or via security gaps in an operating system application.
In South Africa, removable drives are the main source of malware infections facing users. Cyber-criminals specifically target financial information. South African hackers have not created viruses – yet. The majority of attacks come from elsewhere.
Steps to keep viruses at bay
- Use a more secure operating system. Computer viruses often target Windows computers because so many more run on a Windows operating system. An alternative is to run a Linux operating system or Apple’s OSX.
- Install anti-virus software and keep it up to date: it usually prevents the device from known viruses. The anti-virus software on a device must be kept up-to-date so that it can deal with new threats.
- Never open email attachments that contain executable files – files with extensions such as .exe, .com and .vbs. They are capable of doing whatever wrong they have been programmed to do if opened.
- Never open email links that you don’t trust. Treat it as a source that you are not expecting, similar to executable files.
- Never run macros in a document unless you are certain of its purpose. A macro is a way of automating repetitive tasks and are more commonly used in Windows applications like Microsoft Word, Excel, PowerPoint and others. It is now uncommon to have any reason to use a macro.
- Be careful when opening graphics or media files. Although graphics and media files themselves are not viruses, it is possible for a virus to be disguised as a graphic or media file by assuming a false extension, such as .jpg. Opening files like this allows the virus to infect the device.
- Download applications from official stores for smartphones or tablets. Even though many virus attacks still target computers and are more severe due to the volume of data that may be stored on a computer, viruses can also affect smartphones and tablets.
What viruses can do
A virus can be used by cyber-criminals to access sensitive or private information such as credit card details from an infected device. It can be used to monitor the computer user’s keystrokes, passwords or bank details.
Botnets are a group of connected devices that can be remotely controlled, causing devices to perform a specific task such as sending spam emails across the internet or launching attacks on websites.
Apart from losing data, or credibility because recipients receive malicious emails from your email, computer viruses can also be costly in monetary value mainly from the damage caused by the loss or corruption of important data, stolen information, and the cost of avoiding viruses.
Always back up your data
Although the danger posed by viruses still exists and continues to evolve, there have also been tremendous improvements to anti-virus applications over the years. This has made it possible to detect and remove viruses and sometimes clean infected files.
Operating systems and internet browsers have improved the levels of security to help users avoid virus attacks. Despite these efforts, responsibility still rests with computer users to keep viruses at bay. Many anti-virus applications are sold. Some are available free online.
Arguably, computers are more at risk because of the variety of ways in which applications can be obtained and installed. But smartphone manufacturers review their products often and ensure it’s safe to install applications without the risk of a virus attack.
It is important to take preventative measures against computer viruses. It is also wise to limit data loss in the event of a virus attack on a computer or smartphone or tablet by backing up data and emails onto a storage device.