Posts

How to Prevent a Cyber Attack

As the sophistication of cyber criminals continues to increase, their methods and targets have also evolved. Instead of building the large Internet worms that have become so familiar, these criminals are now spending more time concentrating on wealth gathering crimes, including fraud and data theft. An online article from CyberMedia India Online Ltd., suggests that because home users often have the poorest security measures in place, they have become the most widely targeted group. CyberMedia states that 86% of all attacks are aimed at home users (2006). As attacks on home users increase, new techniques are surfacing, including the use of malicious code to attack web browsers and desktop applications. The following is a short review of some techniques that are easily employed and can help stem the tide of these criminal cyber attacks: Although home users may not feel like they are connected to a network, any activity on the Internet can be considered "networked ...

High Risk virus

VIRUS NAME DETAILS Backdoor.Bot Backdoor.Bot is a hacker agent, it allows the computer to be remotely controlled by another user. | More details W32.Netsky.T@mm Netsky.T worm arrives as an e-mail attachment. The infected attachment name, message body and subject is randomly chosen by the worm.   | More details W32.Stration@mm Stration aka Warezov is ...

History of Virus!!

History See also: Timeline of notable computer viruses and worms Academic work In 1972 Veith Risak published the article "Selbstreproduzierende Automaten mit minimaler Informationsübertragung" (Self-reproducing automata with minimal information exchange). [ 3 ] The article described a fully functional virus written in assembler language for a SIEMENS 4004/35 computer system. In 1980 Jürgen Kraus wrote his diplom thesis "Selbstreproduktion bei Programmen" (Self-reproduction of programs) at the University of Dortmund. [ 4 ] In his work Kraus postulated that computer programs can behave in a way similar to biological viruses. In 1984 Fred Cohen from the University of Southern California wrote his paper "Computer Viruses - Theory and Experiments". [ 5 ] It was the first paper to explicitly call a self-reproducing program a "virus", a term introduced by Cohen's mentor Leonard Adleman. In 1987, Fred Cohen published a demonstration ...

What is Computer Virus??

         A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surre...

Download Best Antivirus Online!!

Image
>>Do you have a computer with you? Is it safe from the cyber threats? Have you taken the necessary precautions to protect your computer? Because there is no use in crying after your PC is attacked by a terrible threat. So be alert! The web is full of anonymous, programmed predators! Viruses are programs which are written to attack computers and cause malfunctions. These viruses can go to any extend and damage our PCs. Certain malware take hostage of your computer and take part in criminal activities. These may make you part of that crime. Are you going to be in prison because of a computer virus? But there are true stories where people got sacked from their jobs due because of malware. So purchase or download legitimate antivirus software for your PC and enhance its protection. What are the 10 best virus guards? Do you have any idea? Kaspersky Antivirus 2012 Kaspersky Antivirus is an inclusive piece of software which offers security to users against several...

10 Mobile Virus !!!!

1. Cabir Found: Jun 2004 Nickname: SymbOS / Cabir.A, EPOC / Cabir.A, Worm.Symbian.Cabir.a, Caribe Target: Mobile Symbian S60V2 Scattered through: Bluetooth Damage: slow performance of mobile Cabir is a worm that spreads via a Bluetooth connection and into the inbox messages with an interesting name. If the file will be opened and installed, Cabir will start looking for other mobile targets that are open access his Bluetooth connections to spread. Cabir Bluetooth will enable a periodic basis, about 15-20 minutes, to get other mobile targets. There is no danger of damage, but the hp battery will run out more quickly because of continuous use bluetooth. 2. Skulls Discovered: November 2004 Nickname: SymbOS.skulls, skulls.sis, Extenhded theme.sis Target: Symbian mobile phone Scattered through: Internet Damage: mobile phones can not be used again except to call and receive calls. When installed, Skull H will display notification message: “Install beta_092_free-sm...