Hacking and Virus
Hacking and Virus
Hacking and Virus
In the Web site wisegeek.com they define computer “hacking” as “the practice of
modifying computer hardware and software to accomplish a goal outside of the creator’s
original purpose.”
Ethical Questions
Do all of us have an absolute right to access all the information available on the
Internet?
Do we have a right to communicate and associate freely?
And, if so, does hacking promote freedom of speech and of association by
breaking barriers set up around certain information?
Should hacking be seen as a way of critiquing a system in order to reform it,
somewhat similar to parody?
Does hacking then make Internet use more fair, by allowing to any user access
to information that would otherwise be available only to some?
Or is hacking an unjust takeover of information from those who don’t have the
know-how or resources to protect it?
Are hackers pushing individuals to become more virtuous users of the Internet
– or are they mostly tearing down what others have built, and ultimately limiting
the usefulness of the Internet?
Does hacking promote the development of ethical character?
PHASES of HACKING
Virus
Is a malicious software program loaded onto a user’s computer without the user’s knowledge
and performs malicious actions.
The latest computer viruses are powerful than ever to steal your sensitive data
and harm your PC. Read on to know about them and shield yourself well in
advance.
Do you feel you are at a risk while surfing the Internet or using your computer? Most of
the people think the same. Rising cybercrimes has made people aware of how
important it is to keep their data protected from external threats. Well, cybercrime is not
a new phenomenon. It is in existence since ages. But, now it can have even more
severe consequences. You can become a victim of cyber attack anytime.
Further, the attackers can get access to any confidential information and use it as per
their wish, including planning terrorist attacks. Knowing about the latest computer
viruses and preparing to remove them is the only way through which you can stay
protected. Thus, know about them and keep the antivirus ready to fight with these
malicious computer viruses.
But, before moving on to them, the questions that arise are how to protect the system
and data from these attacks? And, which antivirus is competent enough to shield your
passwords and other sensitive data. Let’s first answer them through the next segment.
How To Protect your PC from Viruses
Protecting your PC from virus attacks is a child’s play if you install ITL Total Security. This
software shields your PC and keeps it safe from malware, virus, and other attacks. Below we
share its prominent features.
New Year has in its store some dangerous viruses. If they enter your system, then they can
severely damage it and misuse your data. Here they are. Take note of them.
1. Cyborg Ransomware
This computer virus is also known by the name AIDS (Aids Info Disk Trojan). Earlier floppy disks
were safer. But, this Trojan horse made them highly unsafe. Yes, the floppy disk you use can
introduce this virus into your computer and corrupt it. To hamper the system’s working, it
replaces AUTOEXEC.BAT and counts the number of times the system reboots. If you have
Windows 10, then you need to be more careful as recently its new variant is found in fake
Windows 10 software updates. To protect yourself from this ransomware, do not click on any
unknown attachment coming with .jpg extension.
3. GoBrut
This is also one of the latest computer viruses.Although this virus is a bit technically weak than
its counterparts, still you should not take it lightly. After invading your device, it can crack
passwords, make your internet slow, and harm the PC. It is based on Golang and uses brute
force to spread itself on various computer systems. To stay protected from this virus, use a
strong password and progressive delays.
4. Jokeroo
Jokers are funny, but this one is not. It is a harmful computer virus you must safeguard your
data from. This virus works as ransomware, and its authors have only one goal, i.e., to spread it
in all the systems of the world. To attain this objective, they encourage other hackers to pay
them $90-$600 and get the membership. Further, once this virus enters a computer, it leaves
the user with nothing. Nor money is left with the users neither the key to decrypt the data. To
protect yourself, make sure to browse safely, update the security applications and operating
system regularly, and always have a backup of essential files.
5. Trojan Glupteba
This is perhaps one of the computer virus names in the world. It enters the system through other
malware or exploit kit. Once it becomes a part of the system’s software, you cannot even know
that your computer is virus infected. It pretends to be a legit software and communicates directly
with the IP address and ports to collect your confidential information. In addition to this, it also
directs you towards other harmful and unknown domains such as travels review.wo,
sportpics.xyzkinosport.top, etc. If you want to stay safe, then enable email and web filters,
restrict macros, and browse safely.
6. Thanatos Ransomware
This ransomware is similar to the famous ILOVEYOU virus. It spreads through spam emails,
malicious attachments, and advertisements. If this virus enters the system and encrypts your
files, then decrypting them is impossible as it creates a new key every time without saving the
keys. To protect your data from Thanatos Ransomware, disable macros, update the operating
system, and backup files regularly.
Imag
e Source: officialhacker
7. ILOVEYOU
Are you thinking someone just confessed his feelings? No, it’s a virus trying to make its way into
your PC. It comes disguised as a confession and once you click on it your computer becomes
unbootable. Further, it also uses your mail list as a medium to create havoc for other users.
Beware of this highly malicious virus. As per reports, it even forced many corporate giants and
Governments to take their mailing systems offline.
8. Code Red
“Red” color symbolizes passion and dangers. One danger that it indicates is the Code Red
virus. This virus first appeared in 2001 and then spread like fire. After infecting your PC, it eats
up its entire disk space. Moreover, it doubles up faster than you could imagine. It also tries
attacking websites. As per reports, it even attacked the White House website. Thus, if you see
the red colored message “Hacked by Chinese”, run to save your PC’s life.
Image Source: hongkiat
9. Storm Worm
Though the name gives an illusion of a worm virus, Storm Worm is a Trojan. It uses news-like
headings to trap users. Thus, whenever you see mail headings like “Saddam Hussein alive!”
resist the temptation to read further and run away from the mail. Once it infects your PC, it uses
it as a source to attack other PCs.
10. Melissa
Here comes another dangerous virus that enters your PC in the form of a word document. The
doc file tempts you with an illusion of passwords to open a few restricted sites. Once you open
it, your system gets infected. After infecting your PC, it spreads to other PCs via your mail list.
14. Conficker
It is also called Downup or Downadup. This largest known worm of all times has infected over 9
million computers within a short span. It uses the unpatched flaws in Windows software to enter
your system. Once it enters, the PC converts into a botnet slave and is used to extort money
from the user. Thus, update your Windows software to keep it secured.
15. Stuxnet
Though viruses are illegal, still it was legally created by the American government in
collaboration with the Israeli Defense Force. They aimed at disrupting the nuclear efforts in Iran.
Through this virus, they managed to ruin approximately one-fifth of the total nuclear centrifuges
in Iran.
16. Mydoom
First identified in 2009, Mydoom is the fastest spreading virus after ILOVEYOU. It spreads
through email that contains the message “andy; I’m just doing my job, nothing personal, sorry”.
Once it infects a PC, it enters other PCs through the user’s email address book.
17. CryptoLocker
This is Trojan ransomware that spreads through various means such as email. Once it infects a
PC, it encrypts certain crucial files on the hard drive. The encrypted files remain locked even
after you remove Trojan from the PC. The only way to unlock them is to pay a ransom before
the deadline. In case you fail to pay the ransom, the amount significantly increases.
Image Source: hongkiat
18. Flashback
First identified in 2011, this Trojan enters your PC disguised as a flash install. It uses the weak
JavaScript codes to spread itself. Once your PC gets infected, it uses it as a medium to infect
other PCs. Further, this Trojan has not even spared the so-called immune Mac and has infected
approximately 6, 00,000 Macs within a short span.
21. Gustuff
Not only viruses but Trojans have also started to trouble PC users. One such troublesome
Trojan is Gustuff. It uses social engineering to attack cryptocurrency applications. It deceives
the users and gets access to the Android Accessibility service. This service automates the UI
interaction. Thus, be cautious of this latest virus attack as it can rob you out of funds.
22. BOrOntOK Ransomware
This one of the latest viruses comes under the category of the most dangerous types of
computer virus. It encrypts your files and adds an extension .rontok to them. In addition to this, it
also makes changes to the system’s startup settings, registry entries, and data or programs
stored in it. Further, it also destroys the security features present in your computer so that they
cannot stop it from harming the system settings. Moreover, to decrypt the files, attackers
demand 20 bitcoins, which you must pay within three days from the date of the attack.
24. Zeus
This is the work of real criminal minds as the Trojan aims at making your PC perform illegal
tasks. Once this latest virus enters in computer, it steals your confidential data such as
passwords of social networks, email, and banking account. It then uses it to do criminal
activities like keylogging and form grabbing.
25. ShadowHammer
Are you thinking of updating your Asus device? If yes, then do it cautiously. Notorious hackers
are using Asus updates as a medium to invade the PC. ShadowHammer comes disguised as
an Asus update. Once the user updates his device, the malware takes the complete PC control.
Thus, be cautious while upgrading your Asus PC. 1 million people have already fallen prey to it.
Having talked about the latest threats, below are the new computer viruses from which you
need to shield your PC.
Beware! The Latest Malware Threats of 2020 are Here to Harm your PC
The latest threats to your PC are even more powerful than their earlier counterparts. Here
we talk about the same so that you can protect the PC and your valuable data in advance.
1. WinRAR Malware
WinRAR, the most popular software to extract zip files has a hidden loophole. The notorious
minds take advantage of these vulnerabilities to introduce malware to your PC. This malware
can corrupt your system and lead to the loss of valuable data. Therefore, if you use WinRAR,
then update it to keep the PC secure
Resist the temptation to access free internet via open wifi. The non-password protected and
unencrypted wifi can be a trap laid by hackers. Don’t fall prey to it.