a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Viruses are often spread by email, either by someone forwarding an infected document to another user or by self-propagating, automatically sending email to everyone in the infected computers address book. Viruses can erase data or interrupt the computer’s operating system.
Malware is malicious software designed to destroy or capture information on the computer without the owner knowing. It is usually attached to an email or software. It can also infect a device through fake app downloads and Wi-Fi spoofing.
Reduce the risk of downloading viruses or malware by not clicking on links or opening email attachments that were unexpected and run anti-virus software.
Instead of clicking on any link in a suspicious email, type in the URL, or do a search on the apu.edu website for the relevant department or page. Even though a website and/or URL in the email looks lreal, criminals can mask its true destination.
Use trusted wi-fi
When at the local Starbucks, bowling alley or the airport, you'll often see many available networks in the area. Be cautious of public wi-fi. Even when accessing a coffeehouse network with a posted password, the hackers drink coffee too. Enter sensitive information like social security numbers or credit card numbers on these networks is strongly discourage. Hackers can also create fake networks with deceiving names to mimic the location. Validating the network with the staff or through the business's website is important.
What To Do if You're a Victim
If you suspect that your device has a virus, contact the IMT Support Center immediately at 626-815-5050.