Tech & Gadgets

An Updated Antivirus Is Not Enough. Become Virus Savvy!

By on

It is true that having the latest in antivirus technology is a sure help in upholding your cyber security. However, covering yourself with these programs is not going to make you any smarter against other vulnerabilities that might arise from your lack of information.

Lucky for you, TheBitBag now presents its? collection of the most notorious viruses to ever come out. You know what it says in ?The Art of War?, one has to ?know their enemy?.

SPAMMER/SAPPHIRE

This virus sent South Korea on a short time-travelling journey to the dark ages when it flooded networks and brought download rates to such a halt you would have sworn it was going backwards. Norton estimated it caused around 1.2 billion dollars in damage. That?s what happens when you slow down networks that affect ATMs and 911 services.

This bad boy was a worm that made a host computer search for other random IP addresses to infect. Once it got a list of viable targets, it would spam ridiculous amounts of useless data packets that would congest networks and slow down internet speeds.

For the fresh soldier on the fields of virtual war, a worm is a program that swims its? way through computer networks without the need for a host program to do its? dirty work. It is completely self-sufficient and self-replicating which means all you have to do to get his party started is to let him in. He doesn?t even need to invite friends. He makes his own. From. His. Own. Flesh.

CODE RED

The name wasn?t kidding. You can even throw in other heavier terms like ?defcon reformat? and ?system screwed? when it comes to this nasty little bugger. It caused the shutting down of the Whitehouse website and other government sites. Yes that?s right. Wipe that silly look on your face because Code Red managed to cripple these addresses like an angry fianc? at a stag party.

This was also another worm that took advantage of a system vulnerability of a certain operating system. On top of spreading itself to other unwilling hosts, it also made these hosts send requests to contact the servers of the Whitehouse. This overload of requests and data was what caused the shut down.

CODE RED II

Yes, you read that right. Just like a terrible horror movie, it had a sequel. And just like most sequels, it was far worse than the first. This time it did not try to attack government-owned sites. This time, it went a little more personal.

Code Red II no longer had host computers send requests to websites. It did something worse. It created an entry point within the operating system that allowed remote access. In short, this virus made it possible for someone else to use your computer without your permission. That?s even worse than having a stranger come into your house and finish all your Nutella. Code Red and Code Red II dealt something around 2.6 billion in damages according to Norton.

I LOVE YOU

That was not a typo. This unfriendly flirt started in the Philippines and infected around 500,000 computers during 2000. This bad girl is proof that flattery can get you a long way.

The virus would attack you in the form of an email from ?your secret admirer?. It contained an attachment with the words ?I love you? attached to it as well. Should the victim be vain enough to open it, presto! Cyber Herpes. This tramp of a virus would replicate itself and install a program that would obtain your password keystrokes and other internet log-in details and send them to this ?secret admirer?. Isn?t that sweet?

 

These guys are just a few of the many threats that permeate the online waves as of the moment. From these we can see that these attacks can only be made possible if users allow access and click carelessly on links and websites.

Which is why TheBitBag advises you to treat the internet as a really big nudist beach. Sometimes it?s fun, sometimes it?s horrible. Be careful of what you look at. Be sure to double check and only visit trusted sources and sites.

And lastly, we also encourage you to visit places like Bitdefender to cross-reference any strange file names or extensions that you think might be a virus. A safe clicker has a happy RAM usage ticker.

 

 

Sources:

http://computer.howstuffworks.com/worst-computer-viruses.htm#page=4

http://uk.norton.com/top-5-viruses/promo

http://www.bitdefender.com/resourcecenter/virus-encyclopedia/

 

About the author

To Top