Text Size:   A+ A- A   •   Text Only
Find     
Site Image
Viruses, Spyware and Malware
Introduction
What is a Virus?
 
A computer virus is malicious software or code that's designed to reproduce itself, spreading from computer to computer, sometimes carrying out malicious actions such as deleting files or modifying your operating system. These actions are often referred to as the "payload."
 
Sometimes you'll see the term "worm" used instead of (or together with) the term virus. Technically speaking, a computer virus needs to attach itself to another program (the "host program") in order to spread, but a worm is self-contained and can spread by itself. The difference is largely academic since the precautions that you'll need to take are the same in either case.
 
What is Spyware?
 
Spyware is software that's installed on your computer, usually without you knowing about it. It then monitors what you do on the computer and sends that information to another computer or system.
 
The most common effect of Spyware is that the program tracks your Internet surfing, reports this back to an Internet advertising company, and then presents you with a series of pop-up ads that relate to your surfing. In theory, this means that the ads are more likely to appeal to you. However, some forms of Spyware are designed to be malicious. These programs try to monitor and record what's happening on your computer, for example: passwords and account numbers that you type, images that are displayed on your screen, and contents of files on your hard drive. The program will send this information back to a hacker or criminal. This clearly represents a major security risk!
 
What is Malware?
 
Collectively, software that carries out malicious actions is known as "malware" (short for 'malicious software').

Featured Links
 
  • The WildList Organization International 
    The WildList is a list of computer viruses that are 'in the wild.' The list is created each month by a team of volunteers based on reports from over 70 researchers and corporations worldwide. The list is used for the certification of anti-virus products by the ICSA, Virus Bulletin and Secure Computing.
 
 
 
  • The New E-spionage Threat
    A BusinessWeek probe of rising attacks on America's most sensitive computer networks uncovered startling security gaps.

Threats and Alerts


Security Alerts


Latest Threats

 1 

02-24-12

Trojan.FakeAV!gen84

 1 

02-23-12

Trojan.Gatak!gen1

 1 

02-23-12

W32.Waledac.C!gen1

 1 

02-23-12

Gamevance!gen5

 1 

02-23-12

Android.Opfake.B

 1 

02-22-12

Trojan.Tracur.B

More...


Top Threats


Removal Tools

·

Trojan.Zeroaccess

·

W32.Qakbot Permission Reset Tool

·

W32.Qakbot Permission Reset Tool

More...


Security Advisories

·

Microsoft Internet Explorer CVE-2012-0155 VML Handling Remote Code Execution ...

·

Microsoft Internet Explorer Use-After-Free Remote Code Execution Vulnerability

More...


Search Threat Database

  

Top Viruses
1. MAL_OTORUN2
2. CRYP_KRAP
3. MAL_VUNDO-9
4. MAL_OTORUN1
5. CRYP_MANGLED
 
Virus Advisories -risk- 
• TROJ_FAKEALE.BG   low  
• WORM_AUTORUN.DMI   low  
• TROJ_DROPAD.KAX   low  
• TROJ_DROPAD.AD   low  
• WORM_WALEDAC.NYS   low  
• more...
 
Related Links
• Hoaxes
• Real-time virus map
 
Virus Search  
go to www.trendmicro.com
Webmasters: add virus info to your site



More Links

 
 
Links to Web sites outside Oregon.gov do not constitute endorsement by Oregon state government or the Department of Administrative Services of the products, services or information provided on those Web sites. If you want to comment on the accuracy of a link, report a broken link, or suggest a new link, click on Web Site Feedback below.