Saturday, December 17, 2016

How Did Malware Appear? Almost Three Decades of Malware Shown in Evolution Chart

Malware did not appear out of nowhere and there is clear information about who wrote the first virus and when. However, since that time back in 1986, malicious software has evolved into something few dared to imagine.

The first computer virus is called Brain and it comes from Pakistan. It infected the boot sector of floppy disks.

First malware was just for fun, or research

Believe it or not, its code contained the names, full addresses and contact details of its creators. Even more unbelievable is that it did not spread through a network of computers, but it traveled by bus, car, bicycle, airplane or whatever transportation people carrying floppies would use.

Brain was not created for damage, but “to explore the security holes of the operating system,” one of its writers, Amjad Farooq Alvi, said in an interview to Mikko Hypponnen in 2011.

The next year, another notable virus appeared, called Stoned. Its origin is New Zealand and no harm would be caused to the computer; instead, one in eight times, the computer screen would display: “Your PC is now Stoned!”


Wednesday, December 14, 2016

The Computer Virus that Blackmails You


Ransomware is the fastest growing form of computer malware, experts warn.

It's a malicious virus that locks the user out of their computer and demands a fee to return their files.

A report published by the Australian government claims 72% of businesses surveyed experienced ransomware incidents in 2015.

The figure was just 17% in 2013 .

It's also a growing threat for mobile devices as it can be hidden in an app, says Gert-Jan Schenk, vice-president at internet security company Lookout.

Online Security Braces for Quantum Revolution

Today’s most widely used encryption methods will not be strong enough resist quantum computers. It is an inevitability that cryptographers dread: the arrival of powerful quantum computers that can break the security of the Internet. Although these devices are thought to be a decade or more away, researchers are adamant that preparations must begin now.

Computer-security specialists are meeting in Germany this week to discuss quantum-resistant replacements for today’s cryptographic systems — the protocols used to scramble and protect private information as it traverses the web and other digital networks. Although today’s hackers can, and often do, steal private information by guessing passwords, impersonating authorized users or installing malicious software on computer networks, existing computers are unable to crack standard forms of encryption used to send sensitive data over the Internet.

But on the day that the first large quantum computer comes online, some widespread and crucial encryption methods will be rendered obsolete. Quantum computers exploit laws that govern subatomic particles, so they could easily defeat existing encryption methods.

“I’m genuinely worried we’re not going to be ready in time,” says Michele Mosca, co-founder of the Institute for Quantum Computing (IQC) at the University of Waterloo in Canada and chief executive of evolutionQ, a cyber-security consulting company.

Computer Security: Blame Game

To err is human, but to foul things up completely takes a computer, or so the old saw goes. Although this may seem a little unfair to computers, a group of cyber-security experts led by Jim Blythe of the University of the Southern California are counting on there by being at least some truth in the saying. They have created a system for testing computer-security networks by making computers themselves simulate the sorts of human error that leave network vulnerable.

Mistakes by users are estimated to be responsible for as many as 60% of breaches of computer security. Repeated warnings about being vigilant, for example, often go unheeded as people fail to recognize the dangers of seemingly innocuous actions such as downloading files. On top of that, some “mistakes” are actually the result of deliberation. Users – both regular staff and members of the information – often disable security features of their computers, because those features slow things down or make the computer more complicated to use.


Yet according to Dr Blythe, such human factors are often overlooked when security systems are tested. This is partly because it would be impractical to manipulate the behavior of users in ways that would give meaningful results. He and his colleagues have therefore created a way of testing security systems with computer programs called cognitive agents. These agents’ motives and behaviors can be fine-tuned to mess things up with the same aplomb as a real employee. The difference is that what happened can be analyzed precisely afterwards.

Another factor that can influence an agent’s behavior is its physiology. Agents can get tired and become hungry, just like people. According to Dr Blythe, “we have focused mainly on fatigue, the physical need to go to the bathroom.” And agents may also skive off, choosing to switch to a spot of web browsing on a synthetic internet that the researchers have created for the purpose.

The team plans a full-scale test later this year, but preliminary results, which Dr Blythe will present to the Association for the Advancement of Artificial Intelligence’s 25th annual conference in San Francisco on August 9th, look promising. In time, then, Dr Blythe’s agents may serve to vindicate another familiar saying about computers: that behind every error blamed on computers there are at least two human errors, including the error of blaming it on the computer.<>

Monday, November 14, 2016

Effective Solution to Remove DetoxCrypto Ransom Virus - Removal Guide

DetoxCrypto Ransomware Description

DetoxCrypto is a malicious ransomware virus categorize as cryptomalware. This ransomware virus is designed to encrypt the user's data and require ransom in order to gain a decryptor. It is important to remove DetoxCrypto ransomware virus completely if you notice warnings and alerts marked with DetoxCrypto appears and lock your computer screen. This post is going to guide you on how to terminate DetoxCrypto virus completely so as to regain a clean, safe and fast running PC.

How to Get rid of Search.cl-cmf.com Redirect Issue? Removal Guide

Search.cl-cmf.com is a browser hijacker from the Adware/ShortcutHijacker family that is added to the browsers while you are installing other software from the Internet. Once installed it will change the browser default settings and set the homepage and search engine for any installed browsers to http://Search.cl-cmf.com/…, surely without your permission. Search.cl-cmf.com will also append the argument http://Search.cl-cmf.com/… to random Windows shortcuts on your desktop and your Windows Start Menu, which makes it considered as a malicious program. By using MalwareBytes or SpyHunter, you can get rid of Search.cl-cmf.com completely. This article will guide you get through the issue easily.


Methods to Remove Search.useaget.com - Manual Removal and Automatic Removal Solution Here!

If it happens that your browser is redirected to Search.useaget.com, you have to realize that undoubtedly the browser is infected with an unwelcome Browser hijacker - Search.useaget.com.

As browser hijacker, Search.useaget.com redirects web browsers, no matter it is Google Chrome, Firefox or Internet Explorer, and brings multiple pop-up advertisements designed by the third party, in the hope of earning money with tons of commercial ads appearing on your computer screen.


Search.useaget.com virus does pretty well in playing havoc and screwing up things that it is able to claim itself to be a normal plug-in/extension, while the fact is that Search.useaget.com is created to have sufficient skills to meddle in your browsing session could drive you buggy soon once it gets intrusion into your computer.