The Computer Viruses
The Computer Viruses
The Computer Viruses
Fraud
The computer underground has realised that paid for Internet services,
such as Internet access, email and web hosting, provides new opportunities
for illegal activity with the additional satisfaction of getting something for
nothing. Virus writers have authored a range of Trojans which steal login
information and passwords to gain free access to other users' Internet
resources.
The first password stealing Trojans appeared in 1997: the aim was to
gain access to AOL. By 1998 similar Trojans appeared for all other major
Internet service providers. Trojans stealing log in data for dial-up ISPs, AOL
and other Internet services are usually written by people with limited means
to support their Internet habit, or by people who do not accept that Internet
resources are a commercial service just like any other, and must therefore be
paid for.
For a long time, this group of Trojans constituted a significant portion
of the daily 'catch' for antivirus companies worldwide. Today, the numbers
are decreasing in proportion to the decreasing cost of Internet access.
Computer games and software license keys are another target for
cyber fraud. Once again, Trojans providing free access to these resources are
written by and for people with limited financial resources. Some hacking
and cracking utilities are also written by so-called 'freedom fighters', who
proclaim that all information should be shared freely throughout the
computing community. However, fraud remains a crime, no matter how
noble the aim is made out to be.
The most dangerous virus writers are individuals and groups who
have turned professional. These people either extract money directly from
end users (either by theft or by fraud) or use zombie machines to earn money
in other ways, such as creating and selling a spamming platform, or
organizing DoS attacks, with the aim here being blackmail.
Bot networks
Apart from servicing spam and adware, professional virus writers also
create Tojan spies which they use to steal money from e-wallets, Pay Pal
accounts and/or directly from Internet bank accounts. These Trojans harvest
banking and payment information from local machines or even corporate
servers and then forward it to the master.
Cyber extortion
You can continue to improve your computer's security and decrease the
possibility of infection by using a firewall, keeping your system up-to-date,
maintaining a current antivirus software subscription, and following a few
best practices.
2. Visit Microsoft Update to verify your settings and check for updates.
Note: If you've installed the most recent version of Microsoft Office,
Microsoft Update will also update your Office programs.
Although spyware programs are different from viruses, some can behave
like viruses and pose similar and other risks. To help protect against
spyware, use antispyware software such as Windows Defender. Windows
Defender comes with Windows Vista. If you use Windows XP SP2, you can
download Windows Defender for no charge.
Other parents feared the virus would have even more severe
long-term consequences. "It's insidious," said Watt A. Nutt
of Memphis. "Once it's in the schools' video systems, it can
take over the whole curriculum and start indoctrinating our
kids in hard-core Communist ideas, like the world isn't flat,
and 2 + 2 isn't 5."