Definition
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
Related concepts
.COM files.EXEADAPSOAPL (programming language)ARPANETAV-TESTAdvanced persistent threatAdwareAlan OppenheimerAlgorithmAmigaAndrew Ross (sociologist)Android (robot)Anomaly detectionAnti-keyloggerAnti-malwareAntivirusAntivirus softwareApple DOSApplication securityArbitrary code executionArtificial lifeAssembler (computer programming)Assembly languageAuthenticationAuthorizationAutomataAutomotive securityBBN TechnologiesBackdoor (computing)BackupBackup and RestoreBenchmark (computing)Binary executablesBiologyBizatchBliss (virus)Boot sectorBootableBootingBootkitBotnetBrain (computer virus)Browser Helper ObjectBrowser securityBulletin boardBulletin board systemCDCIH virusCMD (Windows)CNBCCPU power dissipationCentral processing unitClamWinCleartextClickjackingClone (computing)Clustered file systemCode injectionCommon Vulnerabilities and ExposuresComponent Object ModelCompression virusComputer access controlComputer and network surveillanceComputer fraudComputer fraud and abuse actComputer languageComputer programComputer programsComputer securityComputer security softwareComputer wormConfickerControl flowCopy protectionCopyright infringementCore WarsCredit cardCreeper (program)CrimewareCross-site leaksCross-site scriptingCryptographic hash functionCryptographic keyCryptojackingCryptovirologyCybercrimeCybergeddonCybersecurityCybersex traffickingCyberterrorismCyberwarfareCyclic redundancy checkDOM clobberingDOSDOS APIDVDData-centric securityData breachData loss prevention softwareData maskingData scrapingDatabaseDavid GerroldDebit cardDeceptionDecryptionDefensive computingDenial-of-service attackDesktop computerDesktop environmentsDialerDigital Equipment CorporationDigital imageDigital rights managementDiplomDisc cloningDisk imageDisk storageDownloadingDrive-by downloadE-mailE-mail attachmentEavesdroppingElectronic warfareElk ClonerEmailEmail attachmentEmail fraudEmail spamEmail spoofingEmulatorEncryptionEvolutionary algorithmExclusive orExecutable fileExecutable filesExploit (computer security)FORTRANFile extensionFile systemFile system permissionsFinlandFirewall (computing)Flash driveFlash drivesFleecewareFloppy diskFloppy disksFork bombForm grabbingFred CohenFunction (computer programming)Function (programming)Genetic diversityGoogleGregory BenfordHackerHacktivismHard diskHard disk driveHard driveHardware TrojanHardware backdoorHash (computing)HelsinkiHeuristic (computer science)Heuristic analysisHex dumpHistory of antivirus softwareHistory of malwareHistory of ransomwareHistory sniffingHome computerHoneypot (computing)Host-based intrusion detection systemIBM PC compatibleIncomeInformationWeekInformation risk managementInformation securityInformation security managementInformation warfareInfostealerInsecure direct object referenceInstant messagingIntegration testingInternetInternet Crime Complaint CenterInternet botInternet securityInterrupt handlingIntrusion detection systemJ. B. GunnJerusalem (computer virus)John Brunner (novelist)John von NeumannJussi ParikkaKeyloggerKeystroke loggingKilobyteLahoreLawrence Berkeley National LaboratoryLeonard AdlemanLinuxLinux malwareList of HyperCard virusesList of computer wormsLive CDLogic bombLoginLos Angeles TimesMP4MacMagMacOS malwareMac OSMacintoshMacro (computer science)Macro languageMacro virusMalwareMalware researchMan-in-the-browserMan-in-the-middle attackMark RussinovichMaster Boot RecordMetamorphic codeMichael CrichtonMicrosoftMicrosoft ExcelMicrosoft OfficeMicrosoft OutlookMicrosoft Safety ScannerMicrosoft Security EssentialsMicrosoft WindowsMicrosoft WordMikko HyppönenMisuse caseMobile malwareMobile securityModemMt. Lebanon High SchoolMulti-factor authenticationMutationNTFS file systemNational Vulnerability DatabaseNetwork securityObfuscation (software)Object lifetimeOpen-source softwareOperating systemOptical discOverclockingPDF filesPDP-10Palm OS virusesPasswordPatch (computing)Patch TuesdayPayload (computing)Personal computerPhishingPittsburghPolymorphic codePolymorphic enginePortable ExecutablePrivacy-invasive softwarePrivilege escalationProcess (computing)RAMRandom Access MemoryRansomRansomwareRansomware (malware)Reboot (computing)Registry (computing)Remote access trojanRemovable mediaRichard SkrentaRogue security softwareRootkitRuntime application self-protectionSCA (computer virus)SQL injectionSabotageSafe modeSamy (computer worm)ScamScarewareSci-fiSearch algorithmSecuniaSecure by designSecure codingSecurity-focused operating systemSecurity bugSecurity information and event managementSelf-modifying codeSelf-replicationSharewareShellcodeSite isolationSocial engineering (security)SoftwareSoftware bugSoftware engineeringSoftware testingSolid-state driveSource code virusSpam (electronic)SpammingSpinlockSpreadsheetSpywareStatistical pattern analysisSuperuserSysopSystem File CheckerSystem RestoreSystem administratorTENEX (operating system)Task ManagerTechnical support scamTelephone modemThe Internet ArchiveThe New York TimesThe RegisterThe Shockwave RiderThe Terminal ManThermal design powerThermal energyThreat (computer)Time bomb (software)Timeline of computer viruses and wormsTrojan horse (computing)USB flash drive securityUbuntu LinuxUniform Resource LocatorUniversity of DortmundUniversity of Illinois Urbana-ChampaignUniversity of Southern CaliforniaUsenetVector (malware)VirusVirusTotalVirus hoaxVirus signatureVoice phishingVolume boot recordVulnerability (computer security)Vulnerability (computing)W32/SimileWeb shellWeb threatWestworld (film)When HARLIE Was OneWin32.CabanasWinVirWindows 3.0Windows 7Windows 95Windows APIWindows DefenderWindows Malicious Software Removal ToolWindows MeWindows Media VideoWindows NTWindows Security and MaintenanceWindows UpdateWindows VistaWindows XPWine (software)Wiper (malware)Yahoo!Zero-day attackZip bombZombie (computer science)Zombie (computing)
8 concepts already in your glossary