{"id":492,"date":"2017-01-26T22:45:28","date_gmt":"2017-01-26T22:45:28","guid":{"rendered":"http:\/\/pcdoctorsinc.com\/?p=492"},"modified":"2017-01-26T23:41:50","modified_gmt":"2017-01-26T23:41:50","slug":"how-do-viruses-spread","status":"publish","type":"post","link":"https:\/\/pcdoctorsinc.com\/index.php\/2017\/01\/26\/how-do-viruses-spread\/","title":{"rendered":"Top 5 Ways The Worst Viruses Spread"},"content":{"rendered":"<p><div  class=\"fusion-fullwidth fullwidth-box nonhundred-percent-fullwidth\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:20px;padding-right:0px;padding-bottom:20px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_1  fusion-one-full fusion-column-first fusion-column-last 1_1\"  style='margin-top:0px;margin-bottom:20px;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"imageframe-align-center\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"1.0\" data-animationOffset=\"100%\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/how-do-viruses-spread.jpg\" width=\"1906\" height=\"528\" alt=\"\" title=\"how-do-viruses-spread\" class=\"img-responsive wp-image-494\" srcset=\"https:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/how-do-viruses-spread-200x55.jpg 200w, https:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/how-do-viruses-spread-400x111.jpg 400w, https:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/how-do-viruses-spread-600x166.jpg 600w, https:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/how-do-viruses-spread-800x222.jpg 800w, https:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/how-do-viruses-spread-1200x332.jpg 1200w, https:\/\/pcdoctorsinc.com\/wp-content\/uploads\/2017\/01\/how-do-viruses-spread.jpg 1906w\" sizes=\"auto, (max-width: 800px) 100vw, 1100px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-size-one\" style=\"margin-top:25px;margin-bottom:31px;\"><h1 class=\"title-heading-left\"><h1 style=\"text-align: left;\">Introduction<\/h1><\/h1><div class=\"title-sep-container\"><div class=\"title-sep sep-double\" style=\"border-color:#b7b5b5;\"><\/div><\/div><\/div><h3 style=\"text-align: left;\"><strong>In order to protect yourself effectively, you need to know exactly how these computer viruses spread and attack innocent people. \u00a0Viruses can steal and delete your important data and some viruses are even capable enough to track your whereabouts\u00a0and take your personal identity\u00a0to sell on the black market. \u00a0Here are the top 5 ways computer viruses spread!<\/strong><\/h3>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div  class=\"fusion-fullwidth fullwidth-box nonhundred-percent-fullwidth\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:20px;padding-right:0px;padding-bottom:20px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_1  fusion-one-full fusion-column-first fusion-column-last 1_1\"  style='margin-top:0px;margin-bottom:20px;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-envelope circle-no\" style=\"font-size:100px;margin-left:0;margin-right:0;color:#d8512f;\"><\/i><\/div><div class=\"fusion-title title fusion-title-center fusion-title-size-two\" style=\"margin-top:30px;margin-bottom:31px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><h2 class=\"title-heading-center\"><p style=\"text-align: center;\">#1 &#8211; <strong>Email Phishing<\/strong><\/p><\/h2><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><\/div><p>Number one on our list is Email, the main battleground for hackers. \u00a0With the use of advanced social engineering and information gathering, you could be a victim of a spear phishing attack. \u00a0You might think, &#8220;Well, I don&#8217;t open emails from strange addresses&#8221; &#8230; \u00a0This is a very naive way of thinking as hackers know this. \u00a0They first gather information on you and your interest before they attempt a serious attack. \u00a0They may watch for you to order something before spoofing an email from Fed-Ex. \u00a0They could infect your friend and send you an email from his account. \u00a0They may even go as far as impersonating government authorities.<\/p>\n<p>The most serious viruses I&#8217;ve seen have spread this way&#8211;viruses capable of both deleting and stealing your important data.<\/p>\n<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-hand-o-down circle-no\" style=\"font-size:100px;margin-left:0;margin-right:0;color:#276cb2;\"><\/i><\/div><div class=\"fusion-title title fusion-title-center fusion-title-size-two\" style=\"margin-top:30px;margin-bottom:31px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><h2 class=\"title-heading-center\"><p style=\"text-align: center;\">#2 &#8211; <strong>Infected Trusted Websites<\/strong><\/p><\/h2><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><\/div><p>Yes, you&#8217;re searching for cooking recipes or a business nearby that can fix your toilet. \u00a0All is well in your mind but did you think for a second that these sites you are going to can be outdated and poorly maintenance? \u00a0Believe me, a lot of people don&#8217;t know 1\/5 of the vulnerabilities are can lurk on their sites. \u00a0Redirects, stored scripts, maybe the site is completely compromised already and the attack has full control to put whatever land mines he wants on the page.<\/p>\n<p>This has become such a serious issue that we made this number 2 on our list.<\/p>\n<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-sign-in circle-no\" style=\"font-size:100px;margin-left:0;margin-right:0;color:#24ad24;\"><\/i><\/div><div class=\"fusion-title title fusion-title-center fusion-title-size-two\" style=\"margin-top:30px;margin-bottom:31px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><h2 class=\"title-heading-center\"><p style=\"text-align: center;\">#3 &#8211;\u00a0<strong>Downloads \/ Bundled Software<\/strong><\/p><\/h2><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><\/div><p>So you like free stuff, great. \u00a0Who doesn&#8217;t? \u00a0Before you try downloading and installing that &#8220;hack&#8221; to avoid paying $50 for a game you&#8217;re dying to play. \u00a0You should really think twice, hackers prey on your excitement and curiosity. \u00a0A lot of these key-gens, cracks, torrents, and all of this free crap is most likely free for the sole purpose of infecting you. \u00a0And, don&#8217;t get me wrong, you may find a crack that does what you want it to do. \u00a0Ha, but it will probably do more that what you want it to.<\/p>\n<p>Some software may give you what you want but in return fill your entire PC up with garbage and spyware. \u00a0This can sometimes ruin the overall speed of your PC and render your operating system worthless.<\/p>\n<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-cloud circle-no\" style=\"font-size:100px;margin-left:0;margin-right:0;color:#ad29bc;\"><\/i><\/div><div class=\"fusion-title title fusion-title-center fusion-title-size-two\" style=\"margin-top:30px;margin-bottom:31px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><h2 class=\"title-heading-center\"><p style=\"text-align: center;\">#4 &#8211;\u00a0<strong>Compromised Networks<\/strong><\/p><\/h2><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><\/div><p>We all hate Windows Updates, hell we hate updating our systems in general. \u00a0But, you should know that a lot of these updates are patches to fix bugs on your system. \u00a0When software is created, even by Microsoft or Apple, there will always the possibility of bugs. \u00a0If you have an outdated system and you&#8217;re connecting to public WiFi that was setup just for the sack of getting you free WiFi&#8230; \u00a0There&#8217;s a good possibility that you are at risk and if there&#8217;s a skilled hacker in the area, and believe me there could be&#8211;a lot of these people don&#8217;t have much else to do with their lives.<\/p>\n<p>Update your system and use a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\">VPN<\/a>\u00a0before you think about joining a public WiFi network.<\/p>\n<div class=\"aligncenter\"><i class=\"fa fontawesome-icon fa-bullhorn circle-no\" style=\"font-size:100px;margin-left:0;margin-right:0;color:#ffd700;\"><\/i><\/div><div class=\"fusion-title title fusion-title-center fusion-title-size-two\" style=\"margin-top:30px;margin-bottom:31px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><h2 class=\"title-heading-center\"><p style=\"text-align: center;\">#5 &#8211; <b>Social Media<\/b><\/p><\/h2><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#b7b5b5;\"><\/div><\/div><\/div><p>&#8220;Hey someone posted a link about how to improve your sex life, I think I&#8217;ll click it!&#8221; \u00a0Twitter, Facebook, YouTube&#8230; \u00a0Why do you let us down? \u00a0Oh, it&#8217;s not you, it&#8217;s the jerks on your platform. \u00a0This is out last but not least way that we see people getting infected in the year 2017. \u00a0Social media is not only the harbor of, &#8220;fake news&#8221; but it&#8217;s also the bridge to many of the infections that people are getting today. \u00a0Thank goodness FlashPlayer is just about out of the picture, that helps a little bit but this is still a very popular way that people deceive and trick you into getting infected.<\/p>\n<div class=\"fusion-title title fusion-title-size-one\" style=\"margin-top:30px;margin-bottom:31px;\"><h1 class=\"title-heading-left\">Conclusion<\/h1><div class=\"title-sep-container\"><div class=\"title-sep sep-double\" style=\"border-color:#b7b5b5;\"><\/div><\/div><\/div><p>There you go, the top five ways that I know of that people get infected online. \u00a0As you see I mentioned FlashPlayer in the last highlight, let&#8217;s just say that it&#8217;s very good that it&#8217;s not as prevalent as it used to be&#8211;FlashPlayer was a root cause to so many attacks and infections for years but with the popularity of HTML5 and newer browsers we are getting safer from the horrible tragedy of the early 2000s.<\/p>\n<h4 style=\"text-align: center;\"><\/h4>\n<h4 style=\"text-align: center;\">How do you like my list? \u00a0Was I politically incorrect? \u00a0Did I trigger you? \u00a0Would you like to call me an idiot anyway for no reason? \u00a0Please, do so in the comments below. \u00a0Til next time and that you for reading!<\/h4>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The top 5 ways that I see people getting infected and getting their computers destroyed with backdoors and viruses.<\/p>\n","protected":false},"author":1,"featured_media":496,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/posts\/492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/comments?post=492"}],"version-history":[{"count":6,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/posts\/492\/revisions"}],"predecessor-version":[{"id":500,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/posts\/492\/revisions\/500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/media\/496"}],"wp:attachment":[{"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/media?parent=492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/categories?post=492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pcdoctorsinc.com\/index.php\/wp-json\/wp\/v2\/tags?post=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}