A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.

Here I will show you a small demonstration of how PC  virus works and how to protect yourself from being attacked by these virus.

- RawbieTheRawbit





Not to be confused with adware, malvertising is the use of legitimate ads or ad networks to covertly deliver malware to unsuspecting users’ computers. For example, a cybercriminal might pay to place an ad on a legitimate website. When a user clicks on the ad, code in the ad either redirects them to a malicious website or installs malware on their computer. 

In some cases, the malware embedded in an ad might execute automatically without any action from the user, a technique referred to as a “drive-by download.”




 Worms have been around even longer than computer viruses, all the way back to mainframe days. Email brought them into fashion in the late 1990s, and for nearly a decade, computer security pros were besieged by malicious worms that arrived as message attachments. 

One person would open a wormed email and the entire company would be infected in short order. 




Malware programs that encrypt your data and hold it as hostage waiting for a cryptocurrency pay off has been a huge percentage of the malware for the last few years, and the percentage is still growing. 

Ransomware has often crippled companies, hospitals, police departments, and even entire cities.


Finding and removing malware:


If you're lucky, the only malware program you've come in contact with is adware, which attempts to expose the compromised end-user to unwanted, potentially malicious advertising. 

A common adware program might redirect a user's browser searches to look-alike web pages that contain other product promotions.


Finding and removing malware:

Finding and removing malware:

Spyware is most often used by people who want to check on the computer activities of loved ones. Of course, in targeted attacks, criminals can use spyware to log the keystrokes of victims and gain access to passwords or intellectual property.

Adware and spyware programs are usually the easiest to remove, often because they aren't nearly as nefarious in their intentions as other types of malware. Find the malicious executable and prevent it from being executed — you're done.

Finding and removing malware:

Finding and removing malware:

Finding and removing malware:

 If you're lucky, you can find malicious executables using a program like Microsoft's Autoruns, Microsoft’s Process Explorer, or Silent Runners. 

If the malware program is stealthy, you'll have to remove the hiding component from memory first (if possible), then work on extricating the rest of the program.

 Often, I'll boot Microsoft Windows into Safe Mode or through another method, remove the suspected stealth component (sometimes by just renaming it), and run a good antivirus scanner a few times to clean up the remainders after the stealth part is removed.

Cyber Threat: Latest Computer Virus In 2019


 Cyborg Ransomware

CryptoMix Clop Ransomware

B0r0nt0k Ransomware

Yatron Ransomware




Gandcrab Ransomware

Trojan Glupteba

Kuik Adware

Magniber Ransomware

Thanatos Ransomware

Trojan Panda Banker / Zeus Panda




10 Deadliest Computer Viruses of All Time:



2. Code Red

3. Melissa

4. Sasser

5. Zeus

6. Conficker

7. Stuxnet

8. Mydoom

9. CyrptoLocker


How to Remove Viruses From Your Computer

 This is a detailed breakdown on how to remove any virus from a computer and repair your Windows Installation.   

Recommended Anti-Virus - Webroot SecureAnywhere 


Antivirus vs Anti-malware as Fast As Possible

 Are there differences between antivirus and anti-malware software? If so, which of the two should you use? 

What's the Difference Between Viruses and Malware?

 Are all the things people call "computer viruses" actually viruses?