SlideShare a Scribd company logo
1 of 7
Common sources
of
Computer virus infection
Sources containing downloadable files are commonly infected by malicious
intruders such as worms, spyware, adware and much more.
Always say ‘No ‘ to pirated or cracked software as they might flag it with a
malware containing malicious scripts.
Clicking on unknown clicks and attachments can harm your device. Always make
sure that file type is not ‘.exe.’ before clicking.
Make sure to remove all your external drives when your device is not working as
booting data from unknown CD can infect your device with malicious attempts.
Always install Good Antivirus Software on your device to get extra protection
from malicious attacks.
Common sources of computer virus infection

More Related Content

What's hot

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyRizwan Razman
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus Ranjeta Muniandy
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virusCassidy Lajangang
 
Hermes 2.1 Ransomware (Malware)
Hermes 2.1 Ransomware (Malware)Hermes 2.1 Ransomware (Malware)
Hermes 2.1 Ransomware (Malware)Tish997
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)NamanKikani
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & KeyloggersJithin James
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?Simone Crete
 

What's hot (19)

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
Hermes 2.1 Ransomware (Malware)
Hermes 2.1 Ransomware (Malware)Hermes 2.1 Ransomware (Malware)
Hermes 2.1 Ransomware (Malware)
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Network Security
Network SecurityNetwork Security
Network Security
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?How to protect your Mac from Malware Attacks?
How to protect your Mac from Malware Attacks?
 

More from techexpert2345

Internet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware AboutInternet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware Abouttechexpert2345
 
How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackerstechexpert2345
 
How to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on FacebookHow to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on Facebooktechexpert2345
 
Common Sources of Computer Virus Infection
Common Sources of Computer Virus InfectionCommon Sources of Computer Virus Infection
Common Sources of Computer Virus Infectiontechexpert2345
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Warning Signs of Malware Infection
Warning Signs of Malware InfectionWarning Signs of Malware Infection
Warning Signs of Malware Infectiontechexpert2345
 
Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018techexpert2345
 
Cyber Security Tricks One Should Know
Cyber Security Tricks One Should KnowCyber Security Tricks One Should Know
Cyber Security Tricks One Should Knowtechexpert2345
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Mediatechexpert2345
 
Tips for using a Public Wi-Fi
Tips for using a Public Wi-FiTips for using a Public Wi-Fi
Tips for using a Public Wi-Fitechexpert2345
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virustechexpert2345
 
Ways to Speed up Your Draggy Android
Ways to Speed up Your Draggy AndroidWays to Speed up Your Draggy Android
Ways to Speed up Your Draggy Androidtechexpert2345
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accountstechexpert2345
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecuritytechexpert2345
 
Internet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware aboutInternet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware abouttechexpert2345
 
Tips to make your computer happy
Tips to make your computer happyTips to make your computer happy
Tips to make your computer happytechexpert2345
 
REVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV DashboardREVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV Dashboardtechexpert2345
 
REVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGREVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGtechexpert2345
 

More from techexpert2345 (20)

Internet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware AboutInternet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware About
 
How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
 
How to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on FacebookHow to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on Facebook
 
Email Security Tips
Email Security TipsEmail Security Tips
Email Security Tips
 
Common Sources of Computer Virus Infection
Common Sources of Computer Virus InfectionCommon Sources of Computer Virus Infection
Common Sources of Computer Virus Infection
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Warning Signs of Malware Infection
Warning Signs of Malware InfectionWarning Signs of Malware Infection
Warning Signs of Malware Infection
 
Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018
 
Cyber Security Tricks One Should Know
Cyber Security Tricks One Should KnowCyber Security Tricks One Should Know
Cyber Security Tricks One Should Know
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
 
Tips for using a Public Wi-Fi
Tips for using a Public Wi-FiTips for using a Public Wi-Fi
Tips for using a Public Wi-Fi
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virus
 
Ways to Speed up Your Draggy Android
Ways to Speed up Your Draggy AndroidWays to Speed up Your Draggy Android
Ways to Speed up Your Draggy Android
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecurity
 
Malvertising
MalvertisingMalvertising
Malvertising
 
Internet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware aboutInternet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware about
 
Tips to make your computer happy
Tips to make your computer happyTips to make your computer happy
Tips to make your computer happy
 
REVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV DashboardREVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV Dashboard
 
REVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGREVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLING
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Common sources of computer virus infection

  • 2. Sources containing downloadable files are commonly infected by malicious intruders such as worms, spyware, adware and much more.
  • 3. Always say ‘No ‘ to pirated or cracked software as they might flag it with a malware containing malicious scripts.
  • 4. Clicking on unknown clicks and attachments can harm your device. Always make sure that file type is not ‘.exe.’ before clicking.
  • 5. Make sure to remove all your external drives when your device is not working as booting data from unknown CD can infect your device with malicious attempts.
  • 6. Always install Good Antivirus Software on your device to get extra protection from malicious attacks.