catalogs logo
catalogs.com logo

Difference between hacked and a virus

By Catalogs Editorial Staff

Tell the difference between hacked and a virus on your computer

Tell the difference between hacked and a virus on your computer

Since the dawn of the Internet age, it seems like the terms “hacker” and “virus” have been around as well.  Some people believe there is very little difference between the two. They mostly believe this because it is extremely hard to tell the difference between actually being hacked and getting your computer or device infected with a digital virus. 

In the long run there is a difference between hacked and virus and the difference is pretty important when dealing with the problems either situation creates.

The Hacker: Then and Now

Before you continue reading about the Difference between hacked and a virus there is a special announcement we would like to share with you. Catalogs.com has negotiated special medicare rates for our vibrant community of seniors. If you are over the age of 60, you can head over to our Seniors Health Section which is full of information about medicare. All you need is your zip code and a few minutes of your time to potentially save 100s of dollars on your medicare bills.

Get Free Catalogs When You Sign Up

Don't wait, sign up and get Free Shipping Offers, Discount Codes and lots of Savings Now!

Being hacked used to be something that only large companies and government organizations worried about.  When the Internet was young, hacking was little more than a source of entertainment for bored techies who wanted to show that they were the smartest and the best when it came to computers and the gateway they provided to all kinds of information.

Being hacked, back in the day, meant that someone was actively trying to invade your database through physically hitting the right kind of keystrokes.  This usually took days, weeks or at the minimum several hours.  There was also the added risk that while the hackers were trying to gain access to databases they were not supposed to have access to, people on the other end were busy pinpointing where the unauthorized access was coming from. 

Hacking was little more than a game that was actually glorified at times, even by Hollywood as the little guy fighting against established powers. Much money has been spent by computer users to protect their information from hackers with firewalls and anti-virus software.

While most people have a romanticized idea of just what a Hacker is, the reality is that they are criminals and there are plenty of them who are using their abilities as hackers to create havoc and rip people off.  Anonymous is one group that has caused quite a few problems by attacking major companies and organizations in retaliation for actions they disagree with. 

~

Like computer technology itself, the way that people hack a database has evolved.  While there is still some frontal assaults being done by people sitting at a keyboard or keyboards there is now a new and better way to get someone’s information and that is through the use of a computer virus.

Using A Virus

The definition of a computer virus is that of a small program that’s sole purpose is to impair or destroy a computer’s ability to operate successfully. 

There have been a ton of different computer viruses that made the news over the last few years thanks to the path of destruction they left in their wake.  Some of these viruses are actually considered nothing more than a nuisance, but the worst of the worst are the ones that are built to make a thief’s job that much easier.

Hacking has become big business, thanks to the number of people who have personal and financial information stored online.  A virus is now a tool that hackers have come up with to take a shortcut to gaining information and access to company databases, as well as individual computers. 

Catching a Virus

One of the things that makes a virus such a useful tool for hackers is that once created, the virus can either be implanted or it can simply be downloaded by the unwitting victim.  Once it is downloaded, through email or websites that have been infected, the virus knows exactly what it is supposed to do.  Hackers take advantage of this by using Spam as a weapon.  Mass emails go out to numerous people, with the hopes that someone will download an attachment, or even just open the email and they become infected.

A lot of these viruses then have a directive to access the emails of their victims and send out the virus to people in their contact list, this time posing as friends and neighbors.  This tool then infects others and the beat goes on.

The difference between being hacked and having a virus is that a virus is just another tool for hacking, so they are really just two halves of the same whole. 

 

Popular Savings Offers

 

cc

Top Deals

See All

Recent Posts

Get Free Catalogs When You Sign Up

Don't wait, sign up and get Free Shipping Offers, Discount Codes and lots of Savings Now!

Categories

Saving Tools

Follow Us

Logo

Since 1996, Catalogs.com has been considered the web's catalog shopping authority. Our trends experts have carefully reviewed thousands of catalogs and online stores and have featured only the most respected, distinctive, and trusted ones. From popular favorites to new discoveries, you'll shop and save with exclusive coupon codes!

Invitations for applications for insurance on Catalogs.com are made through QuoteLab, LLC and transparent.ly. Submission of your information constitutes permission for an agent to contact you with additional information about the cost and coverage details of health and auto insurance plans. Descriptions are for informational purposes only and subject to change. Insurance plans may not be available in all states. For a complete description, please call to determine eligibility and to request a copy of the applicable policy. Catalogs.com is not affiliated with or endorsed by the United States government or the federal Medicare program. By using this site, you acknowledge that you have read and agree to the Terms of Service and Privacy Policy.