There are many threats that can compromise our security when surfing the net. Many types of viruses, malware and attacks that in one way or another compromise our systems. Having programs that protect us is very important. A good antivirus can prevent the entry of this type of malicious software. We are going to talk about which are the strangest or less common input methods that often go unnoticed by users.
Less common malware entry methods
When we think about how we can get infected with malware , surely it comes to our minds to download programs or files from the Internet from sites that are not safe, install pirted software, receive an email from Spam and that has a malicious file, a Trojan that allows an attacker to sneak malware, insecure Wi-Fi networks …

However, there are many methods by which we could end up infected. Some of them are rare and can go unnoticed. Let’s see what they are and in this way also be more protected.
Attacked pages
One form of entry of malware that can go unnoticed by users are pages that have been previously attacked. An attacker can inject malicious code, for example. This means that by clicking on a link we can end up on a page that has been created for the sole purpose of stealing information and sneaking malware.
A site may be legitimate, not appear to be a threat, but has nevertheless been attacked previously. This page was not initially created for this purpose, but it can be at a certain point when it has been modified. It is therefore a way of introducing malware.

Use a pendrive
Although it is not a really strange malware entry method, it is true that many users do not know to what extent a simple USB memory can pose a significant security problem for their devices.
The fact of taking a pendrive and going to a copy shop to print documents, lend that memory to another person so that they can pass us some type of information or even connect it to another computer we own, can be the entry point for malware and that at risk our privacy.
Open an image
Yes, a simple image , a simple JPG file, can contain malware. Our antivirus are trained to detect threats in these types of files, but it does not always happen. Therefore, just by opening a photograph that we have received or downloaded from the Internet we can take risks.
It is important that we take extreme precautions and always know if the image that we are downloading or opening is reliable.
Word file
Something similar happens with Word files . It is another entry point for malware that sometimes goes unnoticed. There, cybercriminals, through macros, can modify a file that looks visually legitimate so that, once we open it, it downloads malware to our computer.
These types of files are very common on the network. We exchange them easily. Therefore, you always have to be careful and know where it comes from, recognize if there may be a problem, any risk that compromises the systems.
Fileless malware
Another unusual entry method for malware is fileless malware. As its name suggests, it is a type of threat that leaves no visual trace. In other words, the attacker in this case does not introduce some type of file into memory and stay there, but rather relies on malicious code that works directly in RAM.
This fact also makes it more difficult to detect by antivirus as well. It is essential that we take action and avoid risks. We leave you a complete tutorial where we explain how to avoid the entry of malware.
In short, these are some of the less common entry methods for viruses and threats that could pose a serious problem for our security and privacy when using the devices on the network.