Malware can use certain attacks that convince users to go around security in order to install viruses. Malware can infiltrate content in the computer that was already functioning, and finally, malware can seek out and find any software weaknesses that might exist and attack through downloads or over the wifi network being used.