Security Information |
|
Types Of Computer Infections
Computer infections can be broken up into 4 main categories which are explained in detail below: Viruses Computer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together. This is also the time in which the virus will try to spread itself onto other programs and even other computers! Worms A worm just like a virus is a small piece of software. However worms rather then relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it's host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts. The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999. Trojan Horses A Trojan horse is a computer programs that claims to be one thing, but is actually another. For example you might receive a Trojan horse that is disguised as an image, but when you go to open the file, it will do whatever it is that it was written to do. E-mail Viruses Email Viruses are very common. They work by spreading themselves through email messages. Once they infect a computer, they will then go ahead and replicate themselves by automatically mailing out again to everyone in the victim's e-mail address book. Several of these virus's have raced through the internet. Examples of email virus's are the Melissa Virus, and the ILOVEYOU virus. Feel free to reprint this article as long as you keep the following caption and author biography in tact with all hyperlinks. Ryan Fyfe is the owner and operator of Software Area. Which is a great web directory and information center on Anti Virus Software and other computer software related issues.
MORE RESOURCES: UCLA police chief, accused of security lapses before mob attack, defends his actions Los Angeles Times Former security guard Gregory Livingston found guilty of murdering man at Kroger gas station over loud music Action News 5 Security guard shoots, kills man outside southwest Atlanta strip club, police say Atlanta News First Los Angeles Times: UCLA police chief accused of ‘security lapses’ before attack on pro-Palestinian encampment KTLA Los Angeles Laredo UISD receives 100% safety and security audits from TEA Laredo Morning Times Not Every Security Clearance Investigation is the Same ClearanceJobs College graduations begin amid heightened security following protests KTIV Siouxland's News Channel Former security guard found guilty of killing man over loud music WREG NewsChannel 3 Dave Chappelle's attacker sues Hollywood Bowl, security 2 years after he stormed stage: report New York Post The U.S.-Japan Alliance Council on Foreign Relations Accelerating Innovation: Introducing SocX, SecureIQLab's AI-Powered Cloud Security Validation Platform PR Newswire Florida university graduation events draw security, advisories | Local News | chronicleonline.com Citrus County Chronicle Ripple effect: Local agencies ramp up security after state, national cyberattacks on water supplies Altoona Mirror Netherlands Prepares for World War II Remembrance Amid Gaza Security Fears U.S. News & World Report Man arrested for attacking hospital security guard, nurse Habersham County deputies say Yahoo! Voices Verdict found after deadly 2021 Kroger fuel center shooting WATN - Local 24 NJ religious sites getting $4.8M for security, Gottheimer says NorthJersey.com Chaotic lake getting fence and security Wink News Cabana Live shooting: Victim sues venue, security, others WESH 2 Orlando Dave Chappelle attacker suing Hollywood Bowl security for negligence New York Daily News NSA Highlights Mitigations against North Korean Actor Email Policy Exploitation National Security Agency College campuses tighten security amidst graduation ceremonies Abccolumbia.com After canceling commencement, USC will host event at L.A. Coliseum, rolls out new campus security Los Angeles Times Security guard gets life in prison for killing unarmed man at East Memphis Kroger gas station WATN - Local 24 Joe Andruzzi Foundation, Amplix, celebrate reaching $1 million milestone in food security grants The Sun Chronicle Microsoft will base part of senior exec comp on security, add deputy CISOs to product groups GeekWire Belgium’s Aikido lands $17M Series A for its ‘no BS’ security platform aimed at developers TechCrunch The Mystery Of EgyptAir's Inflight Security Officers... One Mile at a Time The Nordics in NATO: Women, Peace and Security and Regional Defense Peace Research Institute Oslo (PRIO) Security footage released from bible trailer fire | Lebanon | lebanondemocrat.com - Lebanon Democrat Remarks by Ambassador Linda Thomas-Greenfield at the UN Security Council Stakeout on the Situation in Sudan United States Mission to the United Nations Sweden “On Terror Level Four” As Security Is Tightened A Week Before Eurovision Song Contest Deadline Hong Kong’s national security laws ‘not major concern for arbitration community’ South China Morning Post Private security worker raises concerns over handling of UCLA encampment violence FOX 11 Los Angeles Bodega owners, advocates address spike in armed bodega robberies, call for ramped-up security measures News 12 Bronx Iranian Security Forces Shoot Teenage Border Porter ایران اینترنشنال 174 Nebraska schools get $10 million to upgrade security Lincoln Journal Star Thune wants cooperation for cyber security plan KELOLAND.com Pillen deploys Nebraska National Guard to assist with storm recovery, security • Nebraska Examiner Nebraska Examiner Energy, Climate, and Grid Security Subcommittee Hearing: "The Fiscal Year 2025 Department of Energy Budget" Energy and Commerce Committee Intel 471 Acquires Cyborg Security to Expand Its Cyber Threat Intelligence Portfolio with Innovative Threat Hunting ... Business Wire |
RELATED ARTICLES
How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Protecting Your Identity On The Internet Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www. Top 10 tips for Safe Internet Shopping Over 5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Spyware, This Time Its Personal! First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission.. Internet Shopping - How Safe Is It? Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Criminals are Fishing For Your Identity What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. |
home | site map |
© 2006 |