"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide."
The above description is the profile of the average computer-virus writer, according to Jan Hruska, the chief executive of British-based Sophos PLC, the world's fourth-largest anti-virus solutions provider.
"They have a chronic lack of girlfriends, are usually socially inadequate and are drawn compulsively to write self- replicating codes. It's a form of digital graffiti to them," Hruska added.
To create and spread cyber infections, virus writers explore known bugs in existing software, or look for vulnerabilities in new versions.
With more and more new OS (operating system) versions, there will be more new forms of viruses, as every single software or OS will carry new features, and new executables that can be carriers of the infection.
Executables are files that launch applications in a computer's operating system, and feature more prominently in new platforms like Microsoft's Windows 2000 and Windows XP than they did in the older DOS or Windows 3.1.
Virus writers also share information to create variants of the same infection, such as the Klez worm, which has been among the world's most prolific viruses.
The Klez, a mass-mailing worm that originated in November 2001, propagates via e-mail using a wide variety of messages and destroys files on local and network drives.
But the news gets worse. Recent events have uncovered what may be a new trend: spammers paying virus writers to create worms that plant an open proxy, which the spammer then can use to forward spam automatically. Many suspect this occurred with the SoBig virus.
The Sobig worms, began spreading in the early part of 2003. The unusual thing about them was they contained an expiration date and were given a short life cycle to see how features worked in the wild.
Having an expiration date also makes the virus more dangerous, because most people would have been alerted to the new worm within a few weeks and anti-virus definitions would have been updated.
A variant of Sobig, Sobig-F was so efficient that just a few infected machines could send thousands of messages. Sobig-F created a denial-of-service effect on some networks, as e- mail servers became clogged with copies of the worm.
According to Mikko Hypponen, manager of anti-virus research for Finland-based F-Secure Corp, Sobig-F sent an estimated 300 million copies of itself.
Computer Economics, Inc. states, "Nearly 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage." However criminal prosecutions have been few, penalties light and just a handful of people have gone to prison for spreading the destructive bugs.
Why is so little being done? Antiquated laws and, for many years, as crazy as it sounds, a "wink, wink" or even admiring attitude toward virus creators.
One person has been sent to prison in the United States and just two in Britain, authorities say. But the low numbers are "not reflective of how seriously we take these cases, but more reflective of the fact that these are very hard cases to prosecute," said Chris Painter, the deputy chief of computer crimes at the U.S. Department of Justice.
So what can you do to protect yourself against computer viruses?
Well, first and foremost, make sure you have proven anti-virus protection like like Symantec's Norton Anti-Virus or McAfee's ViruScan.
In addition, If you haven't already done so, I highly recommend installing Microsoft's Service Pack 2. SP2 tightens your PC's security with a new Windows Firewall, an improved Automatic Updates feature, and a pop-up ad blocker for Internet Explorer. Plus, the newly minted Security Center gives you one easy-to-use interface for keeping tabs on your PC's security apps.
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide."
Now, I'm no psychiatrist, but to me, the above description sounds more like someone with a few "bats in the belfry!"
About The Author
Dean Phillips is an Internet marketing expert, writer, publisher and entrepreneur. Questions? Comments? Dean can be reached at mailto: dean@lets-make-money.net
Visit his website at: http://www.lets-make-money.net
![]() |
|
![]() |
|
![]() |
|
![]() |
In a word, no - an email message has always... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
My first experience with a spyware BHO based infection was... Read More
If you know what is the 'Fishing' then it's very... Read More
Today,on most internet user's computers, we have the ability to... Read More
A new variation of the Nigerian Scam theme ... Read More
Well, this is an article I never thought I would... Read More
If spyware were a person and he set himself up... Read More
Nobody wants to pay to remove spyware. At the very... Read More
There has not been a time in the history of... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Today the internet is a mine field of malicious code... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Well, if that would have been said to me by... Read More
Computer security for most can be described in 2 words,... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Watching how the traditional media covers the latest virus or... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
The average computer is packed with hidden software that can... Read More
With the advent of the World Wide Web, a whole... Read More
With the Internet entering our lives in such an explosive... Read More
Viruses are, however, not the only malicious software programs out... Read More
The money being spent online is steadily growing. With billions... Read More
Fishing on the Internet has come a long way. However,... Read More
Let us take the example of scrambling an egg. First,... Read More
Working from home has its advantages, including no commute, a... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Despite the current wave of identity theft and corporate security... Read More
Recently I have received email from my bank/credit Card Company,... Read More
You and I are a lot alike. We are both... Read More
A friend called me one day and asked if I... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Have you ever had to call Symantec or McAfee to... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
The 1998 Data Protection Act was not an extension to,... Read More
If spyware were a person and he set himself up... Read More
I am the victim of an internet scam. It is... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Imagine this ? you open up your email box and... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Spyware and adware are becoming major problems for online surfers... Read More
As the number of people using the Internet as an... Read More
You may not realize it, but as you are surfing... Read More
Long gone are the days that we could feel secure... Read More
Every day millions of people go online to find information,... Read More
Much has been said on the theory of password protection... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
During the release of a new software product specialized to... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Can you protect your computer from all possible viruses and... Read More
Phishing is a relatively new form of online fraud that... Read More
Ebay is a great site and is used by many... Read More
Internet Security |