2005 signaled the decline of computer viruses

2005 signaled the decline of computer viruses Picture 1 Hackers this year seem to be indifferent to viruses, but other dangerous programs are rampant and make users' PC systems more vulnerable than ever.

Cybercrime now enhances the construction of spyware, in order to collect personal information for sale or self-exploitation later. In the past, virus writers only wanted to be famous, they attacked to prove their technical power. The bigger the exploit, the more hacker is rated as "good and impressive".

Today, especially in 2005, no one left the effort only for fame. They spread malicious programs to make money and use two methods to steal popular personal information is to install software to detect keyboard characters (key loggers) or to form computer networks controlled by Trojans.

This trend was recorded in January with Downloader.GK Trojan ranked first in the ranking of security vendor Panda. In 2005, there were a number of deep outbreaks and Sober's massive invasion at the beginning and end of the year.

The form of attack also began to change. Although most still rely on taking advantage of the vigilance to persuade victims to open attachments, some hackers have turned to a method of directing users to websites that contain unproductive browser exploits patch.

Not only the Windows operating system, Internet Explorer has also been bombed too many times a year that Danish security firm Secunia offered to remove it and use another browser. But Firefox's open source product is constantly in error, and Safari and Opera are not "immune." Not only browsers, compatible applications also unknowingly become a handler to help hackers "bypass" to avoid firewalls.

With the increase in attacks, patches are more concerned than ever but they launch very "slowly". A researcher who discovered a flaw in Oracle's software had to wait two years for an upgrade to appear in public. Even if the company releases 88 patches, people still wonder about the promise of security.

Meanwhile, every patch of Microsoft seems to become the "guideline" of hackers to compose new exploit codes. Hackers only need 3 days after the August news release to distribute Zotob and 24 hours to do the same in October.

In 2005, there was also a conflict between a security expert and a manufacturer when an employee of the ISS Group (USA) was fired because of a flaw in Cisco products. Cisco also tries to shut down websites that contain information about this error.

In particular, Microsoft began to change hostility towards hackers when it invited them to look at Internet Explorer 7 code.

5 ★ | 1 Vote

May be interested

  • Introduction to viruses, worms, and TrojansIntroduction to viruses, worms, and Trojans
    viruses, worms, and trojans are dangerous programs that can destroy your computer and information on your computer, slow down the internet, and use your computer to distribute them themselves.
  • How to Remove VirusesHow to Remove Viruses
    this is an article showing how to remove viruses on windows or mac computers. in most cases, using your computer's built-in safe mode and antivirus program is enough to remove the virus. however, you need to note that not all viruses can be killed; that means you have to reinstall your computer's operating system to remove the virus.
  • Anti-virus strategiesAnti-virus strategies
    in fact there are many security solutions deployed to combat the risk of computer viruses. however, no solution is really a cure for panacea. the increased damage caused by viruses requires more effective solutions to protect computer systems, especially commercial and service computer systems.
  • The harm of computer viruses and how to prevent themThe harm of computer viruses and how to prevent them
    the harm of computer viruses and how to prevent them. we are using a computer when suddenly the computer is slow or all the important data in your computer is locked or erased, we will feel depressed and frustrated. the reason your computer is losing data and being slow is due to a computer virus.
  • What to do before Vietnamese virus problem?What to do before Vietnamese virus problem?
    contributing to the massive list of these disturbing viruses in 2006 and early 2007 are the viruses made and distributed by vietnamese people. can be included as viruses gaixinh, ymheart, vloveym, w32.viet8xym.worm, ntkcym, w32.rontokbrofl.wor
  • The most scary computer viruses everThe most scary computer viruses ever
    computer viruses really become a nightmare for users. in the following article, network administrator will summarize the most dangerous computer viruses, which have been horrors for computer systems.
  • Top 5 most dangerous computer viruses of all timeTop 5 most dangerous computer viruses of all time
    it has been 20 years since the first computer virus appeared, many new viruses have been born, but typically among these only 10 viruses are the most dangerous and cause the most damage.
  • How to create USB Kaspersky Rescue Disk to kill computer virusesHow to create USB Kaspersky Rescue Disk to kill computer viruses
    when your computer is infected with a virus that cannot access windows, we immediately think of a solution to reinstall windows or ghost again. however, we can boot the computer using kaspersky rescue disk software to remove viruses for the computer, bring the computer back to work without reinstalling windows or ghosting the machine.
  • Asia: 26 types of viruses are spreading strongly!Asia: 26 types of viruses are spreading strongly!
    computer users in asian countries have been warned about 26 lines of computer viruses that are deep within rontkbr.gen spreading throughout the region via email.
  • Computer virus: 20 years look backComputer virus: 20 years look back
    in the three decades of computer development, there has been a twenty-year silence: computer viruses. people have spent a lot of effort to develop computer science and have no less effort to eliminate the virus. like