<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d2008464429550904405\x26blogName\x3dWonders+of+the+Internet\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://preeyaaa.blogspot.com/search\x26blogLocale\x3den_GB\x26v\x3d2\x26homepageUrl\x3dhttp://preeyaaa.blogspot.com/\x26vt\x3d6057795880905744001', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Preeya Bajaj

Saturday 21 March 2015
Internet Security

Cyber Crime



Retrieved from: http://www.exclusive-networks.com/blog/cyber-crime-taking-rich-giving-poor/


Microsoft has launched its Cyber crime Satellite Center on February 16 this year to enhance Cyber security in Asia, including Singapore. 

Microsoft hopes that the center will be a platform for tech giant to better facilitate a safer digital environment for everyone and help organizations make better decisions on vulnerabilities of cyber securities. 

It will be done through a two-pronged approach: 

1) There will be a collaboration with third party partners under Microsoft's cyber threat intelligence program. It will reduce malware-related infections in the region.  It will be facilitated through community based relationships to analyze and assess local and regional cyber security threats. 

2) It will create greater awareness of rising cyber crime threats and develop best practices on prevention for a safer digital world. 

Retrieved from: http://www.channelnewsasia.com/news/singapore/microsoft-steps-up-online/1661468.html 



Top 10 Virus Threats

Credits: Sharon Weinberger



1) Stuxnet
It was the first computer virus designed specifically to cause damage in the real world. Stuxnet was unique as it targeted software that controlled industrial systems. It first infected Iran's uranium enrichment facility in Natanz. It gathered large numbers of confidential data from the facility. Stuxnet was discovered only in 2010. However, it is believed to be that Stuxnet had first infected computers in Iran in 2009. 

2) Conficker Virus
Conficker Virus was believed to be discovered only in 2009. It is a computer worm that crawled its way into millions of Windows-based PCs around the world. It created a botnet army of remotely controlled computers capable to stealing financial data as other information. Conficker virus was complex and that made it difficult to stop. As a result, antivirus researchers gave it  new names,  "super bug" or "super worm". Till today, security experts are unable to identify what the worm is meant to do. 

3) Agent.btz 
Agent.btz spreads through infected thumb drives, installing malware that steals data. It as found on Pentagon computers in 2008. It is suspected to be the work of Foreign spies. Agent.btz created a digital beachhead from which data could be transferred to servers under foreign control. 

4) Zeus
Zeus has become the go-to tool for many cyber criminals today and it is readily available for sale in crime underworld. It can be used to rob passwords and files, helping to create a literal underground economy for compromised identities that can be bought and sold for little as 50 cents.In today's world, a compromised identity doesn't just mean your name, it consists of address, date of birth, mother's maiden name and even the secret security questions. 

5) PoisonIvy
It is known to be a computer security nightmare as it allows attacker to secretly control the infected user's computer. It is known as a remote access trojan because it provides full control to the hacker through a backdoor. Once it is installed in a computer, it can activate controls of the targeted computer to record and manipulate its content. It can even utilize the computer's speaker or webcam to record audio and video. The attacks of PoisonIvy has been traced backed to China. 





6) MyDoom
In 2004, it infected one million computers, launching a huge distributed denial of service attacks which overwhelmed a target by flooding it with information form multiple systems. The virus spreads through email- appearing as a bounced message. When a victim opens the email, the virus gets downloaded itself and robs the victim's outlook address book and spreads it to all the people in the address book. MyDoom spreads faster than another worm ever encountered. 

7) Fizzer
Fizzer is a worm that is all about money. Computers infected with Fizzer don't just take over your address book to spread for the sake of spreading. Instead, it uses the address book to send out familiar porn and pills spam. Fizzer was then followed by a better known spam inducing worm like SoBig which became threatening enough that Microsoft offered a $25,000 reward for information leading to its creator.

8) Slammer
It is an internet worm that can disrupt private and public services, a sign of future trouble. It works by releasing an overflowing amount of network packets, units of data transmitted over the Internet, bring the Internet on many servers to a stop. Victims of Slammer include Bank of America's ATM, 911 emergency response system and a nuclear plant in Ohio. 

9) Code Red
Code red is a gentler version of threat in comparison to modern malware. It has successfully brought down the whitehouse government website and forced other governed agencies to temporarily take down their websites as well. Although there are worms that have overshadowed Code Red, it is remembered as a turning point for malware because of its rapid spread.

10) Love Letter/I LOVE YOU
In 2000, millions of people made the mistake of opening emails labeled " LOVE YOU". The file unleashed a malicious program that overwrote users' image files. The virus emailed itself to first 50 contacts in the address book. It only took hours for Lover Letter to become a global pandemic because it played a fundamental human emotion: the desire to be loved. Moreover, Love Letter could be considered the first socially engineered computer virus. 




Conclusion

Cyber Crime indeed is very real and scary. Although it may not cause physical harm like other crimes there are still consequences that can be detrimental to the victim. With everyone relying more and more on computers, the internet, more and more virus threats are developing. Thus, every user should be vigilant and be aware of anything that seems not right.