{"id":3096,"date":"2024-07-11T06:56:10","date_gmt":"2024-07-11T06:56:10","guid":{"rendered":"https:\/\/www.cyber-rs.de\/glossar\/computer-virus\/"},"modified":"2024-07-11T06:56:10","modified_gmt":"2024-07-11T06:56:10","slug":"computer-virus","status":"publish","type":"encyclopedia","link":"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/","title":{"rendered":"Computer virus"},"content":{"rendered":"<div class=\"ewa-rteLine\">A computer virus is a type of malware that is capable of spreading itself and inserting itself into other computer programs or files. In general, a virus only becomes active when the infected code is executed. Once this happens, the virus can carry out a variety of harmful actions, such as deleting data, destroying programs or stealing personal information.<\/div>\n<div><\/div>\n<div class=\"ewa-rteLine\">Computer viruses are often created by hackers or cyber criminals to cause damage or make a profit. Viruses can enter a system via e-mail attachments, infected websites or other methods. The effects of a virus can range from minor malfunctions to serious problems that can lead to a system becoming unusable or important data being lost.<\/div>\n<div><\/div>\n<div class=\"ewa-rteLine\">To protect yourself against computer viruses, it is important to use anti-virus software and regularly install updates and security patches for operating systems and programs. Users should also be careful when opening emails or browsing websites and avoid unknown attachments or links.<\/div>\n<div><\/div>\n<div>\n<p class=\"p1\">Do you have any questions? <a href=\"https:\/\/www.cyber-rs.de\/kontakt\/\"><span class=\"s1\">Write to us<\/span><\/a> or simply give us a call: +49 212 880 22 962.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A computer virus is a type of malware that is capable of spreading itself and inserting itself into other computer programs or files. In general, a virus only becomes active when the infected code is executed. Once this happens, the &hellip; <a href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/\">Read More<\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[],"tags":[],"class_list":["post-3096","encyclopedia","type-encyclopedia","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Computer virus - Cyber Resilience Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer virus\" \/>\n<meta property=\"og:description\" content=\"A computer virus is a type of malware that is capable of spreading itself and inserting itself into other computer programs or files. In general, a virus only becomes active when the infected code is executed. Once this happens, the &hellip; Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/computer-virus\\\/\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/computer-virus\\\/\",\"name\":\"Computer virus - Cyber Resilience Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#website\"},\"datePublished\":\"2024-07-11T06:56:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/computer-virus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/computer-virus\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/computer-virus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/home-3\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossar\",\"item\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Computer virus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"name\":\"Cyber Resilience Solutions\",\"description\":\"Wir helfen Ihnen, die t\u00e4glichen IT-Bedrohungen zu meistern.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#organization\",\"name\":\"Cyber Resilience Solutions\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png\",\"width\":1293,\"height\":161,\"caption\":\"Cyber Resilience Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/76985476\\\/admin\\\/feed\\\/posts\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Computer virus - Cyber Resilience Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/","og_locale":"en_US","og_type":"article","og_title":"Computer virus","og_description":"A computer virus is a type of malware that is capable of spreading itself and inserting itself into other computer programs or files. In general, a virus only becomes active when the infected code is executed. Once this happens, the &hellip; Read More","og_url":"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/","og_site_name":"Cyber Resilience Solutions","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/","url":"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/","name":"Computer virus - Cyber Resilience Solutions","isPartOf":{"@id":"https:\/\/www.cyber-rs.de\/en\/#website"},"datePublished":"2024-07-11T06:56:10+00:00","breadcrumb":{"@id":"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber-rs.de\/en\/glossar\/computer-virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.cyber-rs.de\/en\/home-3\/"},{"@type":"ListItem","position":2,"name":"Glossar","item":"https:\/\/www.cyber-rs.de\/en\/glossar\/"},{"@type":"ListItem","position":3,"name":"Computer virus"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber-rs.de\/en\/#website","url":"https:\/\/www.cyber-rs.de\/en\/","name":"Cyber Resilience Solutions","description":"Wir helfen Ihnen, die t\u00e4glichen IT-Bedrohungen zu meistern.","publisher":{"@id":"https:\/\/www.cyber-rs.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber-rs.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber-rs.de\/en\/#organization","name":"Cyber Resilience Solutions","url":"https:\/\/www.cyber-rs.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber-rs.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/06\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png","contentUrl":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/06\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png","width":1293,"height":161,"caption":"Cyber Resilience Solutions"},"image":{"@id":"https:\/\/www.cyber-rs.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/76985476\/admin\/feed\/posts\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/encyclopedia\/3096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/encyclopedia"}],"about":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/types\/encyclopedia"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/users\/7"}],"wp:attachment":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/media?parent=3096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/categories?post=3096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/tags?post=3096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}