![]() ![]() Hackers and online criminals have exploited the most intractable security problem: human nature. The Kneber botnet was orchestrated by an Eastern European criminal gang and compromised about 2,500 commercial and government computer systems worldwide in 2010, gaining access to e-mail, banking sites, and social networking sites. Armies of these zombies are known as botnets, which are used for sending huge amounts of spam and malware. They can be controlled remotely to perform tasks without the knowledge of computer owners.īots allow hackers into a computer’s “back door” to seize control, and then turn into “zombies” that send out spam or search for other vulnerable networks. Viruses and worms implant software robots, or “bots,” into a computer. in 2010 identified the 12 costliest computer viruses and worms, ranging from $10 million in damages caused by the Morris virus, the first widespread worm on the Internet, to $38.5 billion caused by MyDoom-the costliest malware so far.īots, Botnets and Zombies. They can be destroyed by downloading updates and patches provided by vendors. They wiggle themselves into operating systems and use communication between computers to spread. Unlike a virus, they do not need to attach to an existing program or file. Worms are viruses that create copies of themselves across the Internet. ![]() Viruses-so-called because they “infect” a computer and spread to others without the knowledge of the computer user-are sent through a network or the Internet by an infected file or link, or are installed through infected disks or other devices. Although Michelangelo the artist was a lot more successful than his namesake, the virus was the precursor of a large but unknown number of viruses that have cost millions in damages and lost productivity. Remember the Michelangelo virus? It appeared in 1992 and threatened to erase computer hard disks each year on the artist’s birthday, March 6. The hacker’s toolbox consists of viruses, worms, zombies and botnets, which are combined with other tactics to go viral. Hackers break into government and other computer systems to change existing settings, and when done maliciously, they can disrupt or even destroy computer systems or networks. But if you’d rather stay connected, it’s important to understand who these high-tech enemies are. One way to avoid malware is to give up e-mail, stop searching the Web, sign off all social networks and give up your new great mobile devices. Attacks have changed from mere pranks to costly criminal acts. It came with this message, “I’m the creeper, catch me if you can!”Ĭreeper, the first computer virus, ushered in an era of malicious software or “malware.” These pests include viruses as well as worms, Trojan horses, spyware, scareware, ransomware, phishing and more, all colorfully named but seriously dangerous.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |