Threat Type: Software based, victim enabled
Examples of Threats:
Modify, corrupt, or destroy files on your computer
Corrupt the computer operating system causing unpredictable behavior, poor performance, or security holes
Unauthorized e-mailing of files or the virus itself to people on your contact list
Allow a hacker to gain control of your computer through a back door
Enable antivirus protection at your Internet service provider (ISP) and/or e-mail provider if it is available.
Install antivirus software on each computer in your home network.
Set up antivirus software to automatically ...