A virus attaches itself to a file and infects computers as it is sent from one computer to another. The severity of viruses can range from mildly annoying to extremely detrimental.
Anti-virus software checks your computer, emails, etc. for viruses. If a known virus is found, this software will remove it from your computer.
Sophos Anti-Virus is available at no cost to faculty, staff, and enrolled students. To download, you must be able to log in using your OHIO ID and password.
Never send an email when you are angry; you will most likely regret it later. Instead, when you are emotional and want to reply to someone, open up an email and write everything you feel, but do not send it. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, save the email and come back an hour later. You only want to reply to any type of emotional situation after you have had time to cool down.
Original release date: July 05, 2016
All Symantec and Norton branded antivirus products
Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system.
The vulnerabilities are listed below:
Symantec Antivirus multiple remote memory corruption unpacking RAR 
The large number of products affected (24 products), across multiple platforms (OSX, Windows, and Linux), and the severity of these vulnerabilities (remote code execution at root or SYSTEM privilege) make this a very serious event. A remote, unauthenticated attacker may be able to run arbitrary code at root or SYSTEM privileges by taking advantage of these vulnerabilities. Some of the vulnerabilities require no user interaction and are network-aware, which could result in a wormable-event.
US-CERT encourages users and network administrators to patch Symantec or Norton antivirus products immediately. While there has been no evidence of exploitation, the ease of attack, widespread nature of the products, and severity of the exploit may make this vulnerability a popular target.