Virus writers and attackers use various methods and techniques to spread malware.
A large number of infections spread via Internet Relay Chat, by visiting underground web pages, adult, gaming
or pirated software
sites, and by using peer-to-peer
(P2P) file sharing
programs which are a security risk that can make your computer susceptible to a smörgåsbord of malware infections
, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such sites may see innocuous-looking banner ads containing code which can trigger pop-up ads
and malicious Flash ads
that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The infection also spreads through emails containing links to websites that exploit your web browser’s security holes and by exploiting a vulnerability
in older versions of Sun Java
. When you click on an infected email link or spam, Internet Explorer launches a site that stealthy installs a Trojan so that it can run every time you startup Windows and download more malicious files. For more detail on how these types of rogue programs
and infections install themselves, read:
Other types of infections spread by visiting malicious and legitimate web sites that have been compromised through various hacking techniques to include the use of malicious code and exploitation of Browser/Operating System vulnerabilities.
One webpage gets infected by virus every 5 seconds
...More than 90 percent of these webpages belong to legitimate sites that have been compromised through hacking techniques such as SQL Injection...Hackers are apparently planting viruses into websites instead of attaching them to email. Users without proper security in place get infected by simply clicking on these webpages.