  {"id":86,"date":"2020-07-13T09:17:13","date_gmt":"2020-07-13T13:17:13","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/"},"modified":"2025-07-30T13:52:59","modified_gmt":"2025-07-30T17:52:59","slug":"viruses","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/","title":{"rendered":"Viruses"},"content":{"rendered":"<h2>Types of Malware<\/h2>\n<ul>\n<li>A <strong>computer virus<\/strong> attaches itself to a program or file, enabling it to spread from one computer to another when opened, leaving infections as it travels.<\/li>\n<li>A <strong>worm<\/strong> is similar to a computer virus, but it is also capable of traveling without any human action. A worm takes advantage of a file or information transport features on your system to allow it to spread unaided.<\/li>\n<li>A <strong>Trojan horse<\/strong> disguises itself as useful software but will actually do damage once run on your computer.<\/li>\n<li><strong>Ransomware<\/strong> uses encryption to block access to files or systems until ransom is paid.<\/li>\n<\/ul>\n<h2>How to Protect Yourself<\/h2>\n<p>Lab computers and University-issued office computers also come installed with antivirus software.<\/p>\n<p>If you need to purchase antivirus software for your personal computer, we recommend both Windows and MAC users install, run and maintain an Antivirus program on their own computers for personal data protection and to keep your computer running at its best.<\/p>\n<h2>How to Avoid Ransomware<\/h2>\n<p>One of the more dangerous developments in malware in recent years is the increasing growth of ransomware. Ransomware (including Cryptolocker, Cryptowall, Crowti and Reveton) is designed to hold valuable computer files, such as images and documents hostage by encrypting. Your files are held for ransom until you pay a fee.<\/p>\n<p>Data that has been encrypted should be considered as lost, unless it has been backed up to other, offline locations. For many years, IT has provided users with the advice to keep important files on networked drives, or at least store a copy there. Networked drives are backed up nightly, and if files are lost due to encryption, can generally be recovered. However, files that are not placed on, or copied to network drives will most likely be permanently lost.<\/p>\n<h3>What You Should Look Out For<\/h3>\n<p>Emails from unknown senders with .doc, .zip, .exe or other attachments and subjects like \u201cadelphi.edu witness subpoena\u201d or \u201cRE: Billing Problem\u201d or \u201cInvoice\u201d. These may not always be in your Spam folder.<\/p>\n<h3>Think You\u2019ve Activated Ransomware or a Virus?<\/h3>\n<p>Shut down your computer immediately, and call the Help Desk at <a href=\"tel:15168773340\">516.877.3340<\/a>.<\/p>\n<h2>How Serious Can This Be?<\/h2>\n<p>It can be very serious. Hollywood Presbyterian Medical Center in Los Angeles paid a ransom of $17,000 in order to regain access to encrypted files. In higher education, Columbia University experienced outages during a recent ransomware attack, and student data was found posted online shortly after.<\/p>\n<p>Adelphi faculty, staff and students have also been victims of such attacks. Unfortunately, these types of malware may also infect any USB External or network shared drive you have access to and encrypt the entire department\u2019s data files that are present on shared drives and online file storage\/sharing services.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Types of Malware A computer virus attaches itself to a program or file, enabling it to spread from one computer to another when opened, leaving infections as it travels. A worm is similar to a computer virus, but it is also capable of traveling without any human action. A worm takes advantage of a file&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":27,"menu_order":11,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-86","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>Viruses &amp; Ransomware | Information Technology at Adelphi<\/title>\n<meta name=\"description\" content=\"91勛圖厙 Information Technology explains the different types of malware that can harm your computer and how to avoid getting them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Viruses &amp; Ransomware | Information Technology at Adelphi\" \/>\n<meta property=\"og:description\" content=\"91勛圖厙 Information Technology explains the different types of malware that can harm your computer and how to avoid getting them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T17:52:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adelphi.edu\/it\/wp-content\/uploads\/sites\/59\/2024\/05\/20240104_research_magazine065-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>","yoast_head_json":{"title":"Viruses & Ransomware | Information Technology at Adelphi","description":"91勛圖厙 Information Technology explains the different types of malware that can harm your computer and how to avoid getting them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/","og_locale":"en_US","og_type":"article","og_title":"Viruses & Ransomware | Information Technology at Adelphi","og_description":"91勛圖厙 Information Technology explains the different types of malware that can harm your computer and how to avoid getting them.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/","og_site_name":"Information Technology","article_modified_time":"2025-07-30T17:52:59+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.adelphi.edu\/it\/wp-content\/uploads\/sites\/59\/2024\/05\/20240104_research_magazine065-1024x683.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/","url":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/","name":"Viruses & Ransomware | Information Technology at Adelphi","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2020-07-13T13:17:13+00:00","dateModified":"2025-07-30T17:52:59+00:00","description":"91勛圖厙 Information Technology explains the different types of malware that can harm your computer and how to avoid getting them.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/viruses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security","item":"https:\/\/www.adelphi.edu\/it\/security\/"},{"@type":"ListItem","position":3,"name":"Viruses"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/86"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":10,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/86\/revisions"}],"predecessor-version":[{"id":724,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/86\/revisions\/724"}],"up":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}