Computer viruses have come a long way since the early days of the personal computer, when hackers bragging rights for adolescents, developed the creation of malicious software that compete for damage or random chaos. Now the pirates have moved their professional ambitions have become, but fans working in the basement of her parents, malware authors are often part of a gang underworld, or directly to a foreign government or an intelligence agency. Because the inserts are developed, they also have the potential to damage and destruction caused by malware.
1) Stuxnet (2009-2010) The arrival of the Stuxnet was like a bad comic book come to life: he had developed the first computer virus to cause damage in the real world, as opposed to the virtual world. While previous malware has caused physical problems secondary Stuxnet was unique as it is the software that controls industrial systems was. More specifically, Stuxnet was designed to damage the machine in the factory to enrich uranium at Natanz in Iran. On the basis of available information, including data from the International Atomic Energy experts believe Stuxnet to enrich a large number of centrifuges Iran essentially giant washing machines, uranium caused by out of control and self-destruction. While Stuxnet was discovered in 2010, it is assumed that. First infected computers in Iran in 2009
2) Conficker Virus (2009) In 2009, a new worm crawled its way into millions of Windows PCs in the world, so. An enormous army of zombie computers controlled remotely capable of stealing financial data and other information Its complexity makes it difficult to stop, and the virus is to create a coalition of experts who conducted himself in order to stop the spread. At its peak, the Conficker worm infected millions of computers, what anti-virus researchers call the "super bug" or "super-worm." But the real secret of Conficker is still infecting many computers that we do not know what to do: botnet army has never been used for certain purposes, to the attention of everyone. Real purpose of the Conficker still confused security experts.
3) agent.btz (2008) This piece of malware is claim to fame is that temporarily forced the Pentagon to spend a blanket ban on USB drives and even helped. Creating a department entirely new army, U.S. Cyber Command Agent.btz is spread by infected USB sticks, stealing the installation of malware that data. If agent.btz found on computers at the Pentagon in 2008, officials believed the work of foreign spies. Former Assistant Secretary of Defense William Lynne, later wrote that. "Digital beachhead, from which can be transferred to servers under foreign control of data" agent.btz a created Although some anti-virus experts have the claim that the virus was the creation of a foreign intelligence service denied, was its effect cyberwar is officially part of U.S. military strategy.
4) Zeus (2007) There's no shortage of kits malware that was to personal information, but Zeus the tool to check for many cyber criminals today and is readily available for sale in the cybercrime underworld. It can be used to steal passwords and files, helps a shadow economy literal identities can compromise bought and sold like hot create 50 cents. In the era of Internet banking and shopping online identity compromise is much more than just a name and Social Security Number: This is your address, date of birth, mother's name, and even secret security questions (your first pet, your favorite teacher, or your best friend from elementary school).
5) PoisonIvy (2005) a nightmare PoisonIvy computer security, it allows the attacker to secretly control the infected user's computer. Malware as PoisonIvy as "remote access Trojan horse", because it provides total control of the author through the back door. Once the virus is installed, the author can activate commands "take targeted computer or manipulate its contents or even speaker of the computer and a webcam, record audio and video. Previously seen as a tool for amateur hackers PoisonIvy used in sophisticated attacks against Dozens of Western companies, including those in the fields of defense and the chemical industry are involved, according to a white paper written by Symantec, the computer security firm. attacks traced to China.
6) MyDoom (2004) MyDoom muscled its way into the world's malware in 2004, rapidly infecting more than a million computer and launch a massive denial of service attack distributed that overwhelms a target of flooding information from multiple systems. The virus spreads through e-mail that appeared to be a message bounced. When the unsuspecting victim opened the e-mail, malicious code downloaded book then robbed the victim Outlook address book. From there it spread to friends of the victim, his family and colleagues. MyDoom spread faster than any seen ver.
7) Fizzer (2003) In 2003, many worms spread via e-mail, but Fizzer was a new creature. If previous worms such as Code Red (see below), were on the wrong Fizzer was a question of money. Although some initially dismissed the severity of the worm because they were not advancing so rapidly, such as Code Red, was Fizzer insidious. "What makes it stand Fizzer is, that it is created the first example of a worm for financial gain," Roel Schouwenberg, a researcher at Kaspersky, an anti-virus companies. "Infected with Fizzer computer began sending spam pharmacy." In other words, Fizzer not only take care of your address book to spread interest in broadcasting, he used your book addressed the now famous porn and spam send pills. Fizzer of the most prominent spam-inducing than SoBig, which was quite threatening as Microsoft offered even a $ 250,000 reward for information leading to the arrest followed his Creator.
8) Slammer (2003) In January 2003, the Slammer worm spread quickly proved that the Internet could public and private services to disrupt an omen for the future chaos. Slammer works by releasing a flood of network packets, data units transmitted over the Internet, the advent of the Internet on many servers to a screeching halt in the vicinity. Thanks to a denial-of-service attack classical Slammer had a real impact on essential services. Among his list of victims: Bank of America ATMs, a 911 response in Washington State, and perhaps disturbing, a nuclear power plant in Ohio.
9) Code Red (2001) to modern malware comparison Code Red seems almost like a softer version of a threat. But when he swept computers worldwide in 2001 was unprepared security expert caught a vulnerability in Microsoft Internet Information Server uses. This allowed the worm disfigure and some websites. Perhaps the most beautiful, Code Red successfully brought the whitehouse.gov website and other government agencies forced to temporarily their own public websites as well. Much later, were obscured by Code Red, he is still remembered by anti-virus experts as a turning point for malware by its rapid spread.
10) Love Letter / I Love You (2000) In 2000, millions of people opening the error of an annex innocent marks make it easy, "I love you." Instead reveal the sincere confession of a secret admirer, had perhaps hoped, the reader, the file is a malicious program that the image files of the user triggered crushed. Then, as a series of letters to the former nuclear option sent the virus itself an e-mail to the first 50 contacts in the address of the Windows user. While by today's standards is Loveletter almost picturesque, it has to be widespread problems for computer users. It took hours to love letter to be a global pandemic, partly because it plays on basic human emotions: the desire to be loved. In this sense Loveletter could as the first computer virus to be social engineering.
1) Stuxnet (2009-2010) The arrival of the Stuxnet was like a bad comic book come to life: he had developed the first computer virus to cause damage in the real world, as opposed to the virtual world. While previous malware has caused physical problems secondary Stuxnet was unique as it is the software that controls industrial systems was. More specifically, Stuxnet was designed to damage the machine in the factory to enrich uranium at Natanz in Iran. On the basis of available information, including data from the International Atomic Energy experts believe Stuxnet to enrich a large number of centrifuges Iran essentially giant washing machines, uranium caused by out of control and self-destruction. While Stuxnet was discovered in 2010, it is assumed that. First infected computers in Iran in 2009
2) Conficker Virus (2009) In 2009, a new worm crawled its way into millions of Windows PCs in the world, so. An enormous army of zombie computers controlled remotely capable of stealing financial data and other information Its complexity makes it difficult to stop, and the virus is to create a coalition of experts who conducted himself in order to stop the spread. At its peak, the Conficker worm infected millions of computers, what anti-virus researchers call the "super bug" or "super-worm." But the real secret of Conficker is still infecting many computers that we do not know what to do: botnet army has never been used for certain purposes, to the attention of everyone. Real purpose of the Conficker still confused security experts.
3) agent.btz (2008) This piece of malware is claim to fame is that temporarily forced the Pentagon to spend a blanket ban on USB drives and even helped. Creating a department entirely new army, U.S. Cyber Command Agent.btz is spread by infected USB sticks, stealing the installation of malware that data. If agent.btz found on computers at the Pentagon in 2008, officials believed the work of foreign spies. Former Assistant Secretary of Defense William Lynne, later wrote that. "Digital beachhead, from which can be transferred to servers under foreign control of data" agent.btz a created Although some anti-virus experts have the claim that the virus was the creation of a foreign intelligence service denied, was its effect cyberwar is officially part of U.S. military strategy.
4) Zeus (2007) There's no shortage of kits malware that was to personal information, but Zeus the tool to check for many cyber criminals today and is readily available for sale in the cybercrime underworld. It can be used to steal passwords and files, helps a shadow economy literal identities can compromise bought and sold like hot create 50 cents. In the era of Internet banking and shopping online identity compromise is much more than just a name and Social Security Number: This is your address, date of birth, mother's name, and even secret security questions (your first pet, your favorite teacher, or your best friend from elementary school).
5) PoisonIvy (2005) a nightmare PoisonIvy computer security, it allows the attacker to secretly control the infected user's computer. Malware as PoisonIvy as "remote access Trojan horse", because it provides total control of the author through the back door. Once the virus is installed, the author can activate commands "take targeted computer or manipulate its contents or even speaker of the computer and a webcam, record audio and video. Previously seen as a tool for amateur hackers PoisonIvy used in sophisticated attacks against Dozens of Western companies, including those in the fields of defense and the chemical industry are involved, according to a white paper written by Symantec, the computer security firm. attacks traced to China.
6) MyDoom (2004) MyDoom muscled its way into the world's malware in 2004, rapidly infecting more than a million computer and launch a massive denial of service attack distributed that overwhelms a target of flooding information from multiple systems. The virus spreads through e-mail that appeared to be a message bounced. When the unsuspecting victim opened the e-mail, malicious code downloaded book then robbed the victim Outlook address book. From there it spread to friends of the victim, his family and colleagues. MyDoom spread faster than any seen ver.
7) Fizzer (2003) In 2003, many worms spread via e-mail, but Fizzer was a new creature. If previous worms such as Code Red (see below), were on the wrong Fizzer was a question of money. Although some initially dismissed the severity of the worm because they were not advancing so rapidly, such as Code Red, was Fizzer insidious. "What makes it stand Fizzer is, that it is created the first example of a worm for financial gain," Roel Schouwenberg, a researcher at Kaspersky, an anti-virus companies. "Infected with Fizzer computer began sending spam pharmacy." In other words, Fizzer not only take care of your address book to spread interest in broadcasting, he used your book addressed the now famous porn and spam send pills. Fizzer of the most prominent spam-inducing than SoBig, which was quite threatening as Microsoft offered even a $ 250,000 reward for information leading to the arrest followed his Creator.
8) Slammer (2003) In January 2003, the Slammer worm spread quickly proved that the Internet could public and private services to disrupt an omen for the future chaos. Slammer works by releasing a flood of network packets, data units transmitted over the Internet, the advent of the Internet on many servers to a screeching halt in the vicinity. Thanks to a denial-of-service attack classical Slammer had a real impact on essential services. Among his list of victims: Bank of America ATMs, a 911 response in Washington State, and perhaps disturbing, a nuclear power plant in Ohio.
9) Code Red (2001) to modern malware comparison Code Red seems almost like a softer version of a threat. But when he swept computers worldwide in 2001 was unprepared security expert caught a vulnerability in Microsoft Internet Information Server uses. This allowed the worm disfigure and some websites. Perhaps the most beautiful, Code Red successfully brought the whitehouse.gov website and other government agencies forced to temporarily their own public websites as well. Much later, were obscured by Code Red, he is still remembered by anti-virus experts as a turning point for malware by its rapid spread.
10) Love Letter / I Love You (2000) In 2000, millions of people opening the error of an annex innocent marks make it easy, "I love you." Instead reveal the sincere confession of a secret admirer, had perhaps hoped, the reader, the file is a malicious program that the image files of the user triggered crushed. Then, as a series of letters to the former nuclear option sent the virus itself an e-mail to the first 50 contacts in the address of the Windows user. While by today's standards is Loveletter almost picturesque, it has to be widespread problems for computer users. It took hours to love letter to be a global pandemic, partly because it plays on basic human emotions: the desire to be loved. In this sense Loveletter could as the first computer virus to be social engineering.
Wat a great content
ReplyDelete