X-Nico

10 unusual facts about Malware


Adware

Programs have been developed to detect, quarantine, and remove advertisement-displaying malware, including Ad-Aware, Malwarebytes' Anti-Malware, ADWCleaner, Spyware Doctor and Spybot - Search & Destroy.

AV Security Suite

The paid edition of Malwarebytes' Anti-Malware has detected and removed it while the system is in safe mode, however a few months later the messages and program had come up again.

Christopher Boyd

Boyd was Director of Malware Research for security company FaceTime, before becoming a Senior Threat Researcher at Sunbelt Software (later known as GFI Software).

Internet abuse

Malware, software designed to harm a user's computer, including computer viruses

Malware

However, having a few diverse nodes would deter total shutdown of the network, and allow those nodes to help with recovery of the infected nodes.

This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.

On the other hand, a worm is a program that actively transmits itself over a network to infect other computers.

The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems.

Worms today work in the same basic way as 1988's Internet Worm: they scan the network and use vulnerable computers to replicate.

Left unguarded, personal and networked computers can be at considerable risk against these threats.


Bleeping Computer

Bleeping Computer also has many mini guides for things such as "How to Re-Install Windows" to "How to Install and Use Ubuntu or any version of Linux" as well as guides on how to remove common Malware infections.

All services to the public are free, including malware and rootkit cleanup of infected computers and removal instructions on rogue anti-spyware programs.

Comodo Group

In response to Symantec's comment over the effectiveness of free Antivirus software, on September 18, 2010, the CEO of Comodo Group Melih Abdulhayoğlu challenged Symantec to see which products can defend the consumer better against malware.

Cross-zone scripting

This type of vulnerability has been exploited to silently install various malware (such as spyware, remote control software, worms and such) onto computers browsing a malicious web page.

Email attachment

However, in practice this advice is not enough – "known trusted sources" were the senders of executable programs creating mischief and mayhem as early as 1987 (with the mainframe-based Christmas Tree EXEC), so since the ILOVEYOU and Anna Kournikova worms of 2000 and 2001 email systems have increasingly added layers of protection to prevent potential malware – and now many block certain types of attachments.

Fast flux

Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.

Fortune telling fraud

See Telemarketing fraud for information about a common scam in which fraud artists install malware on victims' computers.

Fragmented distribution attack

This technique has been first described in a paper published on Virus Bulletin 2009 annual conference by Anoirel Issa, malware Analyst for the Symantec Hosted Services, formerly MessageLabs.

Internet Identity

The suite provides protection against Internet threats, including phishing, malware attacks and Domain Name System (DNS) hijackings.

T2 infosec conference

In t2'09, Mikko Hyppönen presented a case study into an investigation against an international malware writing group.