![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Computer-Virus Writers: A Few Bats In The Belfry?
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide." The above description is the profile of the average computer-virus writer, according to Jan Hruska, the chief executive of British-based Sophos PLC, the world's fourth-largest anti-virus solutions provider. "They have a chronic lack of girlfriends, are usually socially inadequate and are drawn compulsively to write self- replicating codes. It's a form of digital graffiti to them," Hruska added. To create and spread cyber infections, virus writers explore known bugs in existing software, or look for vulnerabilities in new versions. With more and more new OS (operating system) versions, there will be more new forms of viruses, as every single software or OS will carry new features, and new executables that can be carriers of the infection. Executables are files that launch applications in a computer's operating system, and feature more prominently in new platforms like Microsoft's Windows 2000 and Windows XP than they did in the older DOS or Windows 3.1. Virus writers also share information to create variants of the same infection, such as the Klez worm, which has been among the world's most prolific viruses. The Klez, a mass-mailing worm that originated in November 2001, propagates via e-mail using a wide variety of messages and destroys files on local and network drives. But the news gets worse. Recent events have uncovered what may be a new trend: spammers paying virus writers to create worms that plant an open proxy, which the spammer then can use to forward spam automatically. Many suspect this occurred with the SoBig virus. The Sobig worms, began spreading in the early part of 2003. The unusual thing about them was they contained an expiration date and were given a short life cycle to see how features worked in the wild. Having an expiration date also makes the virus more dangerous, because most people would have been alerted to the new worm within a few weeks and anti-virus definitions would have been updated. A variant of Sobig, Sobig-F was so efficient that just a few infected machines could send thousands of messages. Sobig-F created a denial-of-service effect on some networks, as e- mail servers became clogged with copies of the worm. According to Mikko Hypponen, manager of anti-virus research for Finland-based F-Secure Corp, Sobig-F sent an estimated 300 million copies of itself. Computer Economics, Inc. states, "Nearly 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage." However criminal prosecutions have been few, penalties light and just a handful of people have gone to prison for spreading the destructive bugs. Why is so little being done? Antiquated laws and, for many years, as crazy as it sounds, a "wink, wink" or even admiring attitude toward virus creators. One person has been sent to prison in the United States and just two in Britain, authorities say. But the low numbers are "not reflective of how seriously we take these cases, but more reflective of the fact that these are very hard cases to prosecute," said Chris Painter, the deputy chief of computer crimes at the U.S. Department of Justice. So what can you do to protect yourself against computer viruses? Well, first and foremost, make sure you have proven anti-virus protection like like Symantec's Norton Anti-Virus or McAfee's ViruScan. In addition, If you haven't already done so, I highly recommend installing Microsoft's Service Pack 2. SP2 tightens your PC's security with a new Windows Firewall, an improved Automatic Updates feature, and a pop-up ad blocker for Internet Explorer. Plus, the newly minted Security Center gives you one easy-to-use interface for keeping tabs on your PC's security apps. "Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide." Now, I'm no psychiatrist, but to me, the above description sounds more like someone with a few "bats in the belfry!" About The Author Dean Phillips is an Internet marketing expert, writer, publisher and entrepreneur. Questions? Comments? Dean can be reached at mailto: dean@lets-make-money.net Visit his website at: http://www.lets-make-money.net
MORE RESOURCES: Security alert: It’s time to update your iPhone — again NewsNation Now Secretary Antony J. Blinken At the Addressing the Urgent Security Situation in Haiti Meeting - United States Department ... Department of State Mozambique-U.S. seek to deepen defence, security ties Africanews English Chicago Mayor Signs $29 Million Deal With Private Security Firm To Create Tent Camps For Migrants Forbes TSA showcases security checkpoint technologies in use at Antonio ... Transportation Security Administration Biden-Harris Administration Announces Final National Security ... US Department of Commerce United States Hosts UNGA Side Event: Addressing the Urgent ... Department of State Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense Biden Administration Announces Additional Security Assistance for ... Department of Defense OSCE in crisis as Russian veto threatens security body Financial Times Five questions with security expert Greg Parker Johnson Controls Operation Lone Star Bolsters Border Security To Stem Historic Influx Office of the Texas Governor Software supply chain security Grant Thornton TSA canines enhancing security at John F. Kennedy International ... Transportation Security Administration Increased online security coming soon to El Camino El Camino College Union Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security Secretary Antony J. Blinken At United Nations Security Council ... Department of State DHS Homeland Security Investigations Announces Strategy to ... Homeland Security At Disagree Better Event, National Security Experts Warn of the ... - National Governors Association At Disagree Better Event, National Security Experts Warn of the ... National Governors Association Statement by President Charles Michel at the UN Security Council ... Présidence française du Conseil de l'Union européenne 2022 Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... United States Mission to the United Nations CU Boulder earns $5 million award for 5G cellular security research CU Boulder's College of Engineering & Applied Science Diving Deep Into Key Input on the Access Control Market Security Sales & Integration Building the Quad: A Diamond of National Security United States Army Job Security Isn't Enough to Keep Many Accountants From Quitting The Wall Street Journal Why Aviation Security Is A Deadly Serious Matter? Indiatimes.com GEN Nakasone Offers Insight into Future of Cybersecurity and SIGINT National Security Agency 30th Security Forces Squadron Expeditionary Training ... Vandenberg Space Force Base At the edge of the UN security perimeter, those with causes (and ... Chattanooga Times Free Press Indiana University Health reports data security incident pertaining to one of its vendors FOX 59 Indianapolis Unlocking IoT Endpoint Security in 2023: What You Need to Know Security Boulevard Secretary Mayorkas Delivers Remarks at Ukrainian Cultural Artifacts ... Homeland Security ROSEN, TRUSTED INVESTOR COUNSEL, Encourages NAPCO ... GlobeNewswire Fleeing Militants Pose Challenge to Somalia’s Security Voice of America - VOA News Airport Security Officer Caught Stealing From Passenger, Stuffs ... View from the Wing LastPass: 'Horse Gone Barn Bolted' is Strong Password – Krebs on ... Krebs on Security Remarks by Ambassador Thomas-Greenfield at a UN Security ... U.S. Embassy Moscow Ambassador Linda Thomas-Greenfield Joins Secretary Blinken for ... United States Mission to the United Nations Robert Habeck on Germany's new approach to 'economic security ... Atlantic Council Why We're Pulling Our Recommendation of Wyze Security Cameras The New York Times Emma Watson returns to school at Oxford; tight security surrounds her studies | Onmanorama Onmanorama Opinion | Economic cooperation boosts worldwide prosperity ... The Capital Times ylera's Vision: Pioneering IoT Security and Intelligence for Healthcare Healthcare Digital 146th Security Forces Squadron Train with Emergency Management ... 146aw.ang.af.mil |
![]() |
![]() |
![]() |
RELATED ARTICLES
Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Watch Out For That Scam The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. ![]() |
home | site map |
© 2006 |