SlideShare a Scribd company logo
Common sources
of
Computer virus infection
Sources containing downloadable files are commonly infected by malicious
intruders such as worms, spyware, adware and much more.
Always say ‘No ‘ to pirated or cracked software as they might flag it with a
malware containing malicious scripts.
Clicking on unknown clicks and attachments can harm your device. Always make
sure that file type is not ‘.exe.’ before clicking.
Make sure to remove all your external drives when your device is not working as
booting data from unknown CD can infect your device with malicious attempts.
Always install Good Antivirus Software on your device to get extra protection
from malicious attacks.
Common sources of computer virus infection

More Related Content

PPT
Trojan Horse Virus
sitinursyafiqah
 
PPT
Ict Assignment
ainmz
 
PPT
The Trojan Horse (Computing)
Angel Sophie
 
PPTX
Trojan Horse Virus and Hacking
IT Department Akre
 
PPTX
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Adeel Khurram
 
PPT
Backdoor
phanleson
 
PPTX
Torjan horse virus
sumitra22
 
PPT
Keyloggers and Spywares
Ankit Mistry
 
Trojan Horse Virus
sitinursyafiqah
 
Ict Assignment
ainmz
 
The Trojan Horse (Computing)
Angel Sophie
 
Trojan Horse Virus and Hacking
IT Department Akre
 
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Adeel Khurram
 
Backdoor
phanleson
 
Torjan horse virus
sumitra22
 
Keyloggers and Spywares
Ankit Mistry
 

What's hot (19)

PPTX
Trojan horse and salami attack
guestc8c7c02bb
 
PPTX
Impact of ict on society
Rizwan Razman
 
PPTX
Impact of ict on society virus
Ranjeta Muniandy
 
PPTX
Trojan virus & backdoors
Shrey Vyas
 
PPT
Trojan horse
Gaurang Rathod
 
PPTX
Impact of ict on siocety virus
Cassidy Lajangang
 
PPTX
Hermes 2.1 Ransomware (Malware)
Tish997
 
PPTX
Defensive measure of virus
Abrish06
 
PPTX
trojan horse- malware(virus)
NamanKikani
 
PPTX
Trojan ppt pianca
Priyanka Daimary
 
PPTX
Cyber crime
Priyanshi Goel
 
PPTX
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
PPTX
Network Security
English TVTC
 
PPTX
BackDoors Seminar
Chaitali Patel
 
PPT
Spywares & Keyloggers
Jithin James
 
PPT
Computer Virus
loriefe barroga
 
PPTX
Computer securety
rushil ahmed
 
PPTX
Safe computing (Tips & Tricks)
Satyendra Arora
 
PPTX
How to protect your Mac from Malware Attacks?
Simone Crete
 
Trojan horse and salami attack
guestc8c7c02bb
 
Impact of ict on society
Rizwan Razman
 
Impact of ict on society virus
Ranjeta Muniandy
 
Trojan virus & backdoors
Shrey Vyas
 
Trojan horse
Gaurang Rathod
 
Impact of ict on siocety virus
Cassidy Lajangang
 
Hermes 2.1 Ransomware (Malware)
Tish997
 
Defensive measure of virus
Abrish06
 
trojan horse- malware(virus)
NamanKikani
 
Trojan ppt pianca
Priyanka Daimary
 
Cyber crime
Priyanshi Goel
 
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Network Security
English TVTC
 
BackDoors Seminar
Chaitali Patel
 
Spywares & Keyloggers
Jithin James
 
Computer Virus
loriefe barroga
 
Computer securety
rushil ahmed
 
Safe computing (Tips & Tricks)
Satyendra Arora
 
How to protect your Mac from Malware Attacks?
Simone Crete
 
Ad

More from techexpert2345 (20)

PPTX
Internet Etiquette Every Internet User Should Be aware About
techexpert2345
 
PPTX
How to Protect your Wi-Fi from Cyber Hackers
techexpert2345
 
PPTX
How to Stand against Cyberbullying on Facebook
techexpert2345
 
PPTX
Email Security Tips
techexpert2345
 
PPTX
Common Sources of Computer Virus Infection
techexpert2345
 
PPTX
Types of Cyber-Attacks
techexpert2345
 
PPTX
Warning Signs of Malware Infection
techexpert2345
 
PPTX
Rules and Regulations for a Fresh Start of 2018
techexpert2345
 
PPTX
Cyber Security Tricks One Should Know
techexpert2345
 
PPTX
5 Easy Steps to Protect your Social Media
techexpert2345
 
PPTX
Tips for using a Public Wi-Fi
techexpert2345
 
PPTX
Signs your PC has a Virus
techexpert2345
 
PPTX
Ways to Speed up Your Draggy Android
techexpert2345
 
PPTX
Steps to Protect your Social Media Accounts
techexpert2345
 
PPTX
Do’s and Don’ts of Cybersecurity
techexpert2345
 
PPTX
Malvertising
techexpert2345
 
PPTX
Internet etiquette- Every Internet user should be aware about
techexpert2345
 
PPTX
Tips to make your computer happy
techexpert2345
 
PPTX
REVE ANTIVIRUS Introducing REVE AV Dashboard
techexpert2345
 
PPTX
REVE ANTIVIRUS PARTNER & START SELLING
techexpert2345
 
Internet Etiquette Every Internet User Should Be aware About
techexpert2345
 
How to Protect your Wi-Fi from Cyber Hackers
techexpert2345
 
How to Stand against Cyberbullying on Facebook
techexpert2345
 
Email Security Tips
techexpert2345
 
Common Sources of Computer Virus Infection
techexpert2345
 
Types of Cyber-Attacks
techexpert2345
 
Warning Signs of Malware Infection
techexpert2345
 
Rules and Regulations for a Fresh Start of 2018
techexpert2345
 
Cyber Security Tricks One Should Know
techexpert2345
 
5 Easy Steps to Protect your Social Media
techexpert2345
 
Tips for using a Public Wi-Fi
techexpert2345
 
Signs your PC has a Virus
techexpert2345
 
Ways to Speed up Your Draggy Android
techexpert2345
 
Steps to Protect your Social Media Accounts
techexpert2345
 
Do’s and Don’ts of Cybersecurity
techexpert2345
 
Malvertising
techexpert2345
 
Internet etiquette- Every Internet user should be aware about
techexpert2345
 
Tips to make your computer happy
techexpert2345
 
REVE ANTIVIRUS Introducing REVE AV Dashboard
techexpert2345
 
REVE ANTIVIRUS PARTNER & START SELLING
techexpert2345
 
Ad

Recently uploaded (20)

PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Architecture of the Future (09152021)
EdwardMeyman
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Doc9.....................................
SofiaCollazos
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Architecture of the Future (09152021)
EdwardMeyman
 

Common sources of computer virus infection

  • 2. Sources containing downloadable files are commonly infected by malicious intruders such as worms, spyware, adware and much more.
  • 3. Always say ‘No ‘ to pirated or cracked software as they might flag it with a malware containing malicious scripts.
  • 4. Clicking on unknown clicks and attachments can harm your device. Always make sure that file type is not ‘.exe.’ before clicking.
  • 5. Make sure to remove all your external drives when your device is not working as booting data from unknown CD can infect your device with malicious attempts.
  • 6. Always install Good Antivirus Software on your device to get extra protection from malicious attacks.