PM & AI Chronicles

From Product Thinking to Prompt Engineering – One Tool at a Time

Software-Based Security Threats Part 1 ⚠️: Entry Points, Exploits, and Malware Spread 🦠🔄

In the previous article, we explored privacy expectations—how users expect their personal information to be collected, used, and shared responsibly, and what happens when those expectations are not met. 👉 Privacy Expectations

Software-based security threats are by far the widest-ranging and most common types of security risks you need to be aware of today. Unlike physical threats, software threats can enter systems silently—often without the user realizing anything has gone wrong.

The creators of malicious software seem to have no shortage of imagination. They continuously invent new ways to trick users, exploit system weaknesses, and spread harmful programs across devices and networks.

The broad term for software designed specifically to cause harm is malware. Malware includes any software installed on a system without the user’s clear intent, with the sole purpose of causing mischief—such as stealing data, disrupting operations, spying on activity, or damaging systems.

In this article, we’ll explore a few of the most common types of malware, how they enter systems, and why understanding them is a critical first step in protecting your devices and data

All operating systems (OS) and applications have potential vulnerabilities that criminals can exploit. A vulnerability exists when a flaw in the software’s programming creates an opportunity for misuse. If an attacker is aware of that flaw—and has a tool or technique readily available to exploit it—the system becomes a target.

When criminals actually use a vulnerability to attack a system, it’s called an exploit.

Although some operating systems are often considered more secure than others, the reality is simple: all operating systems have weaknesses. Once those weaknesses are discovered, attackers try to exploit them as quickly as possible.

That’s why operating systems include automatic updates and patching mechanisms. As developers become aware of vulnerabilities, they release updates to fix them. Installing these updates promptly is one of the most important and easiest ways to protect your system.

Many computer users believe that only Windows is vulnerable to viruses or malware. This is not true. macOS, Linux, Android, and iOS are not immune to malware attacks.

However, Windows systems do face a higher risk overall, mainly for two reasons:

  • Some attackers specifically target Microsoft out of preference or frustration.
  • Windows is the most widely used desktop operating system, so targeting it offers the greatest potential payoff for criminals.

Think of software vulnerabilities like weak locks on doors. Every house has locks, but some locks may have flaws. Once a thief discovers a weak lock and knows how to pick it, they’ll try to use that knowledge—especially on houses in a busy neighborhood. Installing updates is like replacing weak locks as soon as the manufacturer warns you.

Keeping your operating system and applications updated doesn’t make you invincible—but it significantly reduces your risk and closes many of the doors attackers rely on.

A virus is a type of malicious computer code that inserts itself into an executable file (a program that runs on your system). When that infected file is opened or run, the virus code executes along with the legitimate application, without the user realizing it’s there.

Viruses are designed to hide in their host files, making them difficult to detect at first. Once active, a virus can cause all kinds of mischief—ranging from annoying but harmless actions, like displaying unexpected messages, to severe damage, such as deleting critical files or even causing the operating system to stop working entirely.

Most viruses also have a self-replicating component. This allows them to spread from one executable file to another. Typically, this happens through RAM (memory). When an infected program runs, the virus code is copied into memory, where it can then attach itself to other executable files on the system.

Many people use the term “virus” to describe all types of malware, but that isn’t technically correct. Some malware does not hide inside executable files. Instead, it may take the form of worms or Trojan horses, which behave differently even though they can be just as harmful.

Think of a virus like a sticker with invisible glue placed inside a book. The book looks normal, so you open and read it. While it’s open, the sticky residue quietly transfers to other books on the shelf. Over time, more and more books become affected—even though nothing looked suspicious at first.

Types of computer viruses

Viruses come in many forms, each using a different attack strategy and causing different consequences. Common categories include:

  • Polymorphic viruses
  • Stealth viruses
  • Retroviruses
  • Multipartite viruses
  • Armored viruses
  • Companion viruses
  • Phage viruses
  • Macro viruses

The next sections will introduce common symptoms of a virus infection and explain how viruses operate behind the scenes, helping you better recognize and respond to them.

Some viruses make their presence known immediately. As soon as they gain access to a system, they may take control, display alarming or annoying messages on the screen, or even destroy data on the hard drive. When this happens, it’s usually very clear that the system has been compromised.

Other viruses are more subtle. Instead of announcing themselves, they quietly interfere with normal system operations. In these cases, you may only notice that something doesn’t feel quite right. When trying to determine whether a virus or malware infection has occurred, watch for some or all of the following symptoms:

  • Programs take longer than usual to load. This often happens because the virus is spreading to other files or consuming system resources.
  • Unusual files appear, or essential files disappear. Some viruses delete or corrupt critical system files, making the computer unstable or unusable.
  • Program sizes change from their original installed versions. This can occur when a virus attaches itself to executable files stored on the disk.
  • Applications behave strangely. Your browser, word processor, or other software may show unexpected behavior—such as altered menus, strange screens, or features that no longer work correctly.
  • The system shuts down or starts up on its own. You may also notice excessive or unexpected disk activity without any clear reason.
  • Loss of access to disk drives or system resources. A virus may change device or system settings, making specific components unusable.
  • Startup failures or unexpected error messages during boot. In some cases, the system may fail to reboot entirely.

This list is not exhaustive, but it covers many of the most common warning signs. What is absolute, however, is what you should do next: immediately quarantine the infected system. Disconnect it from networks and other devices as quickly as possible. Containing the infection is critical to prevent the virus from spreading to other users or computers—especially in a networked environment.

In most cases, a virus tries to accomplish one of two things: either render your system unusable or spread to other systems. Many modern viruses first spread and then cause damage, making this behavior especially common in newer malware.

Once a system is infected, the virus may try to attach itself to as many files as possible. Each time you share a file or document with another user, the virus gets an opportunity to spread along with it.

Viruses commonly spread in the following ways:

  • Through networks (wired or wireless): An infected system can spread the virus to other computers on the same network.
  • Through removable media, such as USB flash drives: If an infected flash drive is inserted into another computer, that system can also become infected.
  • Through email attachments: An infected system may automatically attach a malicious file to outgoing emails. The recipient opens the attachment, believing it to be legitimate. When the file is opened, the virus infects the recipient’s system. That newly infected system may then attach the virus to its own outgoing emails, spreading the infection further.

Antivirus detection and signatures

Anti-malware programs often detect malicious software by looking for signatures. A signature is a unique pattern, algorithm, or piece of code that identifies a specific type of malware.

Some viruses can change or alter their signatures, making them harder to detect. Because of this, it is crucial to keep your antivirus signature files up to date, whether updates are installed manually or configured to download automatically. Keeping these definitions up to date greatly improves your system’s ability to detect and block viruses.

Once a system becomes infected, viruses can behave in different ways. Some viruses immediately damage or destroy the target system. While this is serious, it at least makes the infection noticeable, allowing administrators to detect and fix the problem.

Other viruses take a more deceptive approach. Instead of damaging the system right away, they turn the infected computer into a carrier. The carrier system appears to work normally but quietly spreads the virus across the network.

In this scenario, the infected system transmits the virus to servers, shared folders, and other network resources. Those resources may then reinfect additional systems—or even reinfect the original carrier. Until the carrier system is identified, isolated, and cleaned, the virus continues to circulate within the network, repeatedly infecting systems and disrupting normal operations.

This type of virus transmission makes network infections especially difficult to eliminate and highlights the importance of early detection, isolation, and thorough cleanup in networked environments.

A worm is different from a virus because it is self-contained and can reproduce on its own. Unlike a virus, a worm does not need a host application (such as an executable file) to spread. Worms actually caused many so-called “virus outbreaks” reported in the news.

It’s also possible for a worm to carry additional malware to a target system when it delivers other malicious software; that additional malware is called a payload.

Worms can be classified into two main types:

  • Active worms: These spread without any human involvement. They exploit weaknesses in operating systems, network protocols (such as TCP/IP), or internet services to move their payload automatically across a network.
  • Passive worms: These spread through user behavior. They typically use email attachments, links, or social engineering tricks to persuade users to unknowingly transport the worm from one system to another.

Because worms can spread rapidly—especially across networks—they can cause widespread disruption in a short amount of time. Fortunately, most modern anti-malware programs can detect and remove worms.

Think of a worm like a contagious person walking through an office building. They don’t need help opening doors—they move from room to room on their own. In some cases, they may also carry harmful items and leave them behind in each room they enter. Unless the person is identified and stopped, the problem keeps spreading throughout the building.

This ability to move independently is what makes worms especially dangerous in networked environments.

A Trojan horse (often called a Trojan) is a rogue application that enters a system or network while disguised as legitimate software. Unlike viruses or worms, Trojans don’t announce themselves as harmful—instead, they pretend to be something helpful or trustworthy.

Some Trojans claim to offer services you actually want. For example, a particularly deceptive Trojan may present itself as a malware scanner. Instead of protecting your system, it creates problems or installs its own malicious software, such as a keylogger. A keylogger records everything you type—usernames, passwords, messages—and sends that information to a file or a remote attacker, allowing the hacker to impersonate you.

Trojan horses do not replicate themselves, so they are not considered viruses in the technical sense. Most commonly, Trojans are delivered by worms or trick users into installing them through deceptive downloads or links. Fortunately, most modern anti-malware programs can detect and remove Trojan horses.

Think of a Trojan horse like a package delivered to your home that looks official—maybe even with a familiar logo. You bring it inside because it seems safe. Once opened, however, it releases something harmful that spies on you or damages your belongings. The danger wasn’t in how it arrived—but in what it really was.

This deception is what makes Trojan horses especially dangerous: they rely on trust, not force.

Software-based security threats come in many forms, but they all share one common goal: to exploit trust, weaknesses, or user behavior to cause harm. From exploits and viruses to worms and Trojan horses, understanding how these threats work and how they spread is the first step toward defending against them.

While no system can ever be completely risk-free, staying informed, keeping systems up to date, and using reliable anti-malware protection significantly reduce your exposure.

In the following article, we’ll continue exploring additional software-based threats and techniques, building on the foundation established here to strengthen your overall security awareness 👉 Software-Based Security Threats_2

This article is part of the Security Concepts & Threats series, which explores the fundamentals of protecting data, people, and devices in a connected world. For the full overview of how modern risks, defenses, and access controls fit together, refer to the main article in this series. 👉 Security Concepts&Threats