Wednesday, April 10, 2013

DIFFERENT TYPES OF VIRUSES





Computer viruses are computer software that is harmful to computers; it enters a computer without the permission of the owner and without its knowledge. Most of these viruses have the ability to replicate themselves and spread, but some other viruses can cause more serious damages to computers.  They can affect the programs and performance systems.  Computer viruses and worms are similar to human viruses, because they are “alive,” they have to have a host and a weak link like any biological virus. A weak link in a human may be a weak immune system and in a computer a not updated antivirus, they replicate until they reach their target or gain control of the host.
They are several kinds of viruses that can be classified in different areas:

1-Memory Resident Virus:
These types of viruses establish in the computer memory, they infect all the computers fill when the operating system, they can corrupt files that are in the computer. They hide in the ram and they are very efficient because after eliminating the viruses they can stay in the ram and get control of the memory and it can run its own code.
            Some Examples are:
1.      Randex
2.      CMJ
3.      MEVE
4.      MrMklunky

2-Direct Action Viruses:
These viruses are usually found in the hard disk’s root directory. The main purpose is to replicate, and it takes action when the virus is executed.  They are file-infesters, because the corrupt files in the device.  You can find them in computers, pen drives or hard disks.  These types of viruses are hard to get rid of because they change their location into new files.
            Example:
                                    1.Vinenna virus

3-Overwrite viruses:
These kinds of viruses can be very harmful to computers and personal information’s because it deletes the information contained in files that it infects. The virus leaves the field useless once it infected that file. They are located in the file they infected but they are tricky to find because they do not change the size of the file, and the only way to clean the file infected is to delete the entire file, resulting in loosing the original content in that file.
            Example:
1.      WAY
2.      Trj.Reboot
3.      Trivial.88.D

4-Boot Sector Virus
            The boot sector of a hard disk is very important because information of the disk is located there and along with a program it makes possible to start the computer from the disk. The boot sector virus affects the Boot and it makes it difficult for the computer to start.

5-Macro Virus
            These types of virus were created with applications or programs that contained .doc, .xls, .pps, .md. Macro viruses infect these files and also infect templates and many documents that have macro.
Example:
1.RELAX
2.Melissa. A
3.Bablas

6-Directory Virus
            These viruses infect the directory of your computer by changing the location of a file. These viruses are very harmful because once the virus infects your computer it is impossible to locate the original file you are trying to run.
            Example:
                        Dir-2 Virus

2012s worst Viruses
Flame
The first viruses to spread medium Bluetooth, and it was detected in a Russian lab

Belgian Computer Crime Virus
Spread all over the world and charge people a fee saying that this fee was for the police and ask people for personal information.


http://www.buzzle.com/articles/different-types-of-computer-viruses.html
http://www.webroot.com/En_US/consumer/articles/computer-security-threats-computer-viruses
http://www.webopedia.com/TERM/V/virus.html

Francisco Salazar  

Tuesday, April 9, 2013

Computer Worms


Computer worms are different from viruses because they reproduce and spread differently, they are independent at the time they spread and also they reproduce independently and can invade more computers than viruses. Worms can travel in networks; by this they can reach more computers faster.

Email Worms

This type of worm is one of the most famous because it spreads through emails, infecting millions of computers.  It moves from attachment to attachment or different links.  These are the most common ways they spread:
  • MS Outlook Services
  • Direct connection to SMTP servers using their own SMTP API
  • Windows MAPI functions
Internet Worms 
This worms move through networks, they infiltrate your networks using local operating systems, they look for weak networks or vulnerable ones.  When they get to your network they gain full access of your computer and can cause some severe damage and they get the opportunity to spread to other networks easily.
Examples
-not patched
-Data packets

Francisco Salazar

http://www.howstuffworks.com/virus5.htm
http://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htm

Friday, April 5, 2013

Cyber Warfare

 

So we all have heard about the nuclear threats from North Korea, but nobody is worried about the possible cyber-attacks.  Currently North Korea does not have the technology to reach the United States with their nuclear weapons.  They do, however, have the technology to shut down South Korea’s computer networks.  Recently North Korea launched cyber-attacks that shut down banks and broadcasters of South Korea.  The United States has partnered with South Korea to try to prevent future attacks from North Korea.  Since there is the looming threat of nuclear weapons it has become more prominent on everyone’s mind.  The threat of cyber-attacks may need to be more prominent in everyone’s mind.  Since all of our information is kept on computer’s there is a possibility of information being hacked by countries that we consider our enemies.  This is why it is great that the United States is taking precautions to protect their information.  

Cyber warfare can potentially become a huge threat to the United States and other developed countries who keep their information predominately online.  Think of all the personal information and government information that is stored online.  This information could be obtained by an enemy and used for their gain.  A hacker could also just shut down our systems.  In the United States everything is now being ran by technology and if someone hacked this information and shut down the system it would put our country on an unavoidable lock down.  It is important that the government and businesses work to protect their information from being hacked by malicious enemies.  

Haley Hunt

Wednesday, April 3, 2013

Hacking the Stars!

Good day all,


   I came across an article this morning that stated that power couple BeyoncĂ© and Jay-Z was hacked!  Their bank account information was leaked onto the web by hackers.  Michelle Obama has also recently been in the news because her social security number was compromised.  These hackers are using various worms/viruses in order to get this information.  Now, tell me, If it was they could get a little private information from the First Lady, then stealing mine or your identity should be a cake walk.  The First Lady, the secret service could not protect her from this virtual attack.  This friends proves that we are becoming ever more vulnerable to viruses, malware and all the sorts.  How can we average Joes be safe when the high status individuals can not even be protected? Yes, they may be of a greater target towards hackers. Although that still does not release us from the threat of identity theft.  I suggest we follow the guidelines set by my colleague Almendina and be safe on the internet.







LONG LIVE THE WEB!


-Hector Hernandez

http://urbanislandz.com/2013/03/12/beyonce-jay-z-amond-celebrities-bank-accounts-hacked/

Saturday, March 30, 2013

These days’ people are downloading and exchanging more information over the Internet then ever before. People who are sharing files over the Internet are in such a rush, they forget about those nasty little bugs that can add up over time and make your files act oddly, crash your computer, pop up bizarre messages, or worst of all, destroy your operating system. A computer virus is one of the main problems people have with their computers. It usually loads itself into your computer system when you run a program with an attachment. From then on, it’ll reproduce itself by attaching copies of itself to other programs on your hard drive. When a virus opens up and exposes itself, it is set up to look like something you might want to download on your computer. This is why you have to be careful when opening certain programs and always make sure you take the time to look around for signs. When you want to see if a virus is attached somewhere in your operating system you have to launch the program and if something unexpected happened, then you will know it is too late.

As I mentioned in my previous blog, the most important actions you can take to protect your operating system against viruses is to:
•       Install antivirus
•       Do not open e-mail attachments
•       Keep your operating system updated

After doing some more research on how to protect your computer from viruses, I came across some other way to protect your operating system from these annoying little bugs.
•       Be sure to do a full back up of your system on regular basis
•       Be aware of hoaxes
•       Don’t allow your web browser to automatically run programs.

I hope my blog has informed all of you how to protect your operating systems. But wait, were not done yet.  Viruses are not the only type of programs that are written solely to destroy your computer or use it in an unauthorized way. Other programs are Logic Bombs, Trojan Horses, and Worms. Do some of your own research on these programs and help your computer before these monsters destroy it!


Almedina Suljicic


http://www.howstuffworks.com/virus7.htm

http://www.sovereignbank.com/business/security_center/protect_computer_against_virus.asp

Monday, March 25, 2013

Malware and Society

   
      In my last blog I discussed how big of an impact a virus or worm can have on society. The reality is quite sobering and hopefully shed some light on the necessity of being careful to whom and where you release personal information to. This blog will talk more about how someone would use malware to gain access to this kind of information. Hopefully by understanding the process, one might be able to prevent their personal information from falling into the wrong hands. Then I will also discuss more ways in which a simple virus can compromise a whole society.

    The first thing to understand is the distinction between Malware, viruses, worms, and etc. Malware is a general term that describes malicious software. This software is generally what will contain the actual virus itself. A virus will attach itself to an executable file so it can spread itself, whereas a worm replicates itself by sending copies of itself over a network. A Trojan horse is a term used to describe a certain kind of coding that will allow a virus to operate without detection under the guise that the actually software is supposed to be doing something else. Key logging application records keystrokes and sends them back to someone who can then decipher it and use it to gain access to whatever they were looking for. All of these tools are utilized by hackers today allowing them to gain access to massive amounts of data.

    In the last blog I discussed the PSN hack, while it is unclear how they actually got into the network, it is clear they utilized a system of physical and computer based means to accomplish this task. This allowed them access to the information of over 70 million users which are now at risk for phishing scams or similar kinds of issues. A nuclear facility also had a breach when a tainted USB device carrying an unknown virus infected the mainframe of one of their plants. While nothing extremely urgent was reported it did expose the flaws in their security protocols on these devices. If the virus had been used in such a way it would not be very difficult to infect the plants and cause a Chernobyl anywhere in the world. This again shows the dangers of our increasingly heavy reliance on computers, but yet at this crossroad it is also a necessity to do so.



Jonathan Alsop


Sources

http://thehackernews.com/2013/01/malware-infects-us-powers-through-usb.html#_
http://en.wikipedia.org/wiki/Malware#Infectious_malware:_viruses_and_worms

Wednesday, March 20, 2013

Effects of Viruses or Worms on Personal Computers


Viruses or worms can have a significant impact on your personal computer.  Before you can understand the effects that a virus might have on you as a user, you need to understand the definition of a virus.  A virus is “a self replicating application that spreads by making copies of itself by inserting into other programs.”  There are multiple ways that a virus could affect you personally.  
The most obvious problem that a virus can cause is to destroy your computer.  Because viruses can target data stored in your hard drive, a virus may completely crash your computer.  At this point, you may not even be able to reboot your computer.  This can cause inconveniences for you, as well as the financial burden of having to purchase a new computer. 
Not all viruses are so significant that they would completely destroy a computer.  Some attack the memory of the PC, which may result in significantly slower performance from the computer.   
Keeping photos and copies of contracts, or receipts on your computer is relatively common.  Having your computer crash from a virus may result in you losing these irreplaceable files if they are not also stored on an external disc or hard drive.  That is why backing up your data on an external drive is so important. 
        Bryce Morgan