4 Ways to Get a Virus

Having your computer infected with malicious code is a difficult experience. The person whose device gets infected is not wholly innocent however. Unless the virus is on a device beforehand, there are typically four types of actions that can result in malware getting on a computer. Understand what they are and avoid them.

1. Torrents


Downloading torrents is a quick way to get a virus. Downloading a torrent file also exposes your IP address to the public if you are not using a VPN or other method. That sharing, which makes the torrent process possible, is the same thing that makes your system vulnerable. 

Illegally-activated programs can be downloaded on such sites. The people who cracked the program are the same people who can install malware onto the file. An estimate from several years back estimated that 1/3 of user visiting torrent-related sites get infected. Techniques exist that make downloading torrents safer. But when it comes to cybersecurity, stay away.

2. Adult Websites

Visiting adult websites can lead to having your computer compromised. Much like Torrent sites, websites with adult material can serve malware-infecting content. The content can be in the form of material downloaded or served up by just visiting in the form of "malvertising". Malvertising infects users computers by showing in the browser. Organization policies likely forbid visiting adult websites on company computers. This method of acquiring a virus makes the user especially guilty.

3. Thumbdrives


Picking up a thumbdrive laying around can be a convenient solution to transferring a file. But that convenience comes at the cost of risking malware from coming to the computer it's plugged into. The virus can spread from computer-to-computer any time a USB is plugged in. There are ways to make USBs more secure with passwords and encryption, but transferring files in a secure digital-only format is more secure.

4. Phishing

Getting a virus from a phishing attack is another possibility. Phishing attacks can succeed on even a sophisticated user. The emails are disguised to fool the user into taking an action like clicking a link that installs malware. The email might imitate a person in your company or look like it's coming from an organization that someone is familiar with. There are methods to detect phishing like paying close attention to the email address it is coming from and the link URL. For a complete list of tips to avoid phishing, download this guide to preventing phishing.

Did you enjoy this blog article? Comment below with your feedback.



Founded in 2000, CIPHER is a global cybersecurity company that delivers a wide range of Managed Security Services and Security Consulting Services. These offers are supported by the best in class security intelligence lab: CIPHER Intelligence. With offices located in North America, Europe, and Latin America, 24×7×365 Security Operations Centers and R&D laboratories, the services are complemented by strategic partners around the globe. CIPHER is a highly accredited company holding ISO 20000 and ISO 27001, SOC I and SOC II, PCI QSA and PCI ASV certifications. We have received many awards including Best MSSP from Frost & Sullivan for the past six years.

Our clients consist of Fortune 500 companies, world-renowned enterprises, and government agencies with countless success stories. CIPHER provides organizations with proprietary technologies and specialized services to defend against advanced threats while managing risk and ensuring compliance through innovative solutions.

Recent Security Posts


Twitter Feed