9. Macro
Macro viruses focus on language commands in Microsoft word. Similar comments are applied to other programs. The macros are keywords that are deployed on sequences for commands. The macro viruses are built to add their malicious code to the macro sequence in a word document. Cyber attackers use social engineering to target the user. The user can enable macros to load the virus. The word document error is overcome in the version Office 2016. It can be accessed for trusted work and blocked if required across the company.
10. Rootkit
The rootkit virus is secretly installed an illegal rootkit on an affected process which opens the gate for hackers and accesses the complete system. The hacker can disable or modify the functions. Unlike other viruses, it is designed to surpass antivirus software. The updated version of vital antivirus involves rootkit scanning. The boot-record infectors affect the code found in a particular system area on a disk. It is attached to USB and DOS boot or MBR on hard disks. But these viruses are not common these days since it relies on physical storage media.