RSS

Tag Archives: computer virus

Jumlah Serangan ke Social Networking Meningkat di 2011


Apa yang akan terjadi di tahun 2011 nanti berkaitan dengan keamanan IT? Threat atau ancaman apa saja yang harus  kita waspadai dan akan seperti apakah wajah dari ancaman tersebut di tahun 2011?

Simak prediksi para pakar keamanan dari ESET. Prediksi ini disusun David Harley, Director Malware Intelligence di  ESET serta para analis di Cyber Threat Analysis Center (CTAC), sebuah badan yang menganalisis ancaman dunia  maya, sekaligus bagian dari badan riset yang baru dibentuk oleh ESET tentang trend 2011.

Menurut analisis tersebut, media jejaring sosial masih akan menjadi target utama serangan sebagaimana yang telah dialami selama tahun 2010 baik oleh para pengguna Google maupun Facebook. Bahkan akan mengalami kecenderungan meningkat di tahun 2011 terhadap situs-situs media sosial lainnya seperti LinkedIn, Orkut, dan Twitter. Demikian pula terhadap search engine seperti Bing and Yahoo.

Read the rest of this entry »

Advertisements
 
Leave a comment

Posted by on January 18, 2011 in Technology

 

Tags: , , , , , , , , , , ,

World Most Famous Computer Viruses..


computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. Read the rest of this entry »

 
4 Comments

Posted by on January 4, 2011 in Technology

 

Tags: , , , ,