http://www.
onlinesecurityauthority.com
onlinesecurityauthority.com
onlinesecurityauthority.com

RSS Feed for This PostCurrent Article

Computer Viruses that Come a Callin’

Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.

Virus: Trojan.Lodear

A that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

Trojan Horse
Creative Commons License photo credit: ccarlstead

Virus: W32.Beagle.CO@mm

A mass-mailing worm that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.

Virus: Backdoor.Zagaban

A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

Virus: W32/Netsky-P

A which spreads by emailing itself to addresses produced from files on the local drives.

Get the Best Managed PC Care on the Planet!

Virus: W32/Mytob-GH

A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

Virus: W32/Mytob-EX

A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.

Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER

This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

Virus: Zafi-D

A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption “CRC: 04F6Bh” and the text “Error in packed file!”.

Virus: W32/Netsky-D

A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.

Virus: W32/Zafi-B

A (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”

Get the Best Managed PC Care on the Planet!


Other Posts From Around The Web:

Internet Viruses Can Target Your Computer – Computer viruses are a hot topic that seem to affect everyone who owns a computer system, whether at work or at home. The companies that produce software programs that catch and delete these computer viruses are constantly updating …

Spotting A Hoax Virus Warning – One of the problems with the detection and elimination of computer viruses is that there are many hoax viruses that exist that make computer users believe that legitimate virus threats are also hoaxes. Thousands of e-mails are sent from …

How Computer Viruses Work And How To Protect Your Computer – Computer viruses have become the technological bogeyman that scares computer users all over the world. We have all heard of how dangerous computer viruses are and how it can damage your data. Of course, aided by the bloated images …

In Japan, Using Copyright to Fight Computer Viruses – Although containing a criminal prohibition of some breadth and a potential prison sentence of up to 10 years, this may lack sufficient deterrent value, considering the enormity of the damage a computer virus is capable of causing. …

OSA Technorati Tags: , ,

OSA Trackback URL

Post a Comment

Add Me As a Friend

Categories

Archives

OSA Gang

Blog Marketing
Jack Humphrey's blog marketing, social marketing, and link building tips.

The Publicists Assistant
We are experienced in helping clients receive the Online Publicity and Radio Publicity they deserve. Since your success determines our success, we are dedicated to bringing you RESULTS!

Recent Peeps

OSA Highlights





Submit Blog & RSS Feeds



OSA & CHW Radio

blogcatalog





googlesyndication