SlideShare a Scribd company logo
1 of 1
Download to read offline
Copyright © 2005 The Virus Doctor™, Houston, Texas, USA. All rights reserved.
A Dozen Dangerous Myths About Computer Viruses
One of the reasons viruses have become such a threat to modern computer systems is the fact that
today’s viruses are different in almost every way from what they were a few years ago. But most
computer users aren’t aware of these changes. Consequently, their idea of adequate protection
against viruses, worms, and Trojan horses is likely to be far less than what is necessary.
All of the following statements are beliefs commonly held about viruses, and all are myths. In most
cases the statement was true a few years ago, but certainly not in 2005:
1. They are created by bored, sociopathic teenagers and vandals – Most viruses today are writ-
ten for the express purpose of making money; many are produced “on contract” for criminals
or unscrupulous operators.
2. You’ll know when your computer is infected by a virus – Modern viruses generate more cash
for their creators every minute they remain on an infected computer; they will go to extreme
measures to reduce the likelihood of detection.
3. If you’ve backed up your data, you don’t need to worry about virus infection – The end result
of a modern virus infection is far more extensive than deleted or corrupted files on your hard
drive; confidential or sensitive files may have been compromised, with no obvious symptoms
on the infected computer.
4. It’s safe to reuse the same backup media every time you back up your data – Since the symp-
toms of a virus infection may not be obvious, the files that were backed up last week, or even
last month, could contain the virus as well.
5. If your computer has anti-virus software installed, you don’t need to worry about virus infec-
tion – Today’s viruses, worms, and Trojan horses can sometimes elude detection by even the
best Anti-Virus software; and if your virus definitions are not up to date, your exposure is
greatly magnified.
6. Viruses are only transmitted through e-mail attachments – Some viruses are activated as
soon as the infected e-mail message is opened, even without an attachment.
7. The only attachments that can hurt you are .exe files – There are more than 40 file types, or
extensions, that may contain or spread a virus; some of the most common today are .com,
.cpl, .eml, .exe, .pif, .reg, .scr, .vbs, and .zip.
8. It’s safe to open attachments from senders you recognize – Most e-mail messages that con-
tain virus-infected attachments will appear to come from someone familiar to you; the virus
“spoofs” the From address, to mislead the recipient into a false sense of security.
9. Viruses only come through e-mail – There are many other ways a modern virus can spread,
including malicious links on Web sites, through Chat or Instant Messenger sessions, or across
a Local Area Network (LAN); some generate random IP addresses and attempt to infect any
computer with a corresponding address.
10. The Preview Pane is a safe, convenient way of previewing your e-mail messages – The Pre-
view Pane in Microsoft Outlook or Outlook Express is a convenient feature, but it is also a
major security weakness that has been exploited by numerous viruses.
11. Viruses can only spread to e-mail addresses in your address book – Viruses that do spread
via e-mail look for the target addresses in other files on the infected computer; these may be
files with an extension of .doc, .eml, .mdb, .xls, or those associated with other common office
applications or databases.
12. Only Windows-based computers are susceptible to viruses – In a recent week, the National
Cyber Alert System identified 90 new or updated vulnerabilities; of these, 12% targeted
Windows systems, 50% affected Unix/Linux, and 38% affected multiple Operating Systems.

More Related Content

What's hot

Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1Arbab Usmani
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or LaptopSOBXTECH
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 

What's hot (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Computer virus
Computer virus Computer virus
Computer virus
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Computer virus
Computer virusComputer virus
Computer virus
 
COmPuter
COmPuterCOmPuter
COmPuter
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or Laptop
 
Internet security
Internet securityInternet security
Internet security
 
Sowmya
SowmyaSowmya
Sowmya
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Internet threat
Internet threatInternet threat
Internet threat
 

Similar to 12 Myths About Computer Viruses

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingmentcheauyih
 

Similar to 12 Myths About Computer Viruses (20)

M
MM
M
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from UltraUploader

01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hackingUltraUploader
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)UltraUploader
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manualUltraUploader
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...UltraUploader
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manualeUltraUploader
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)UltraUploader
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)UltraUploader
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoriaUltraUploader
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applicationsUltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...UltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyUltraUploader
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer virusesUltraUploader
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 

More from UltraUploader (20)

1 (1)
1 (1)1 (1)
1 (1)
 
01 intro
01 intro01 intro
01 intro
 
01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hacking
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manuale
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Blast off!
Blast off!Blast off!
Blast off!
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 

12 Myths About Computer Viruses

  • 1. Copyright © 2005 The Virus Doctor™, Houston, Texas, USA. All rights reserved. A Dozen Dangerous Myths About Computer Viruses One of the reasons viruses have become such a threat to modern computer systems is the fact that today’s viruses are different in almost every way from what they were a few years ago. But most computer users aren’t aware of these changes. Consequently, their idea of adequate protection against viruses, worms, and Trojan horses is likely to be far less than what is necessary. All of the following statements are beliefs commonly held about viruses, and all are myths. In most cases the statement was true a few years ago, but certainly not in 2005: 1. They are created by bored, sociopathic teenagers and vandals – Most viruses today are writ- ten for the express purpose of making money; many are produced “on contract” for criminals or unscrupulous operators. 2. You’ll know when your computer is infected by a virus – Modern viruses generate more cash for their creators every minute they remain on an infected computer; they will go to extreme measures to reduce the likelihood of detection. 3. If you’ve backed up your data, you don’t need to worry about virus infection – The end result of a modern virus infection is far more extensive than deleted or corrupted files on your hard drive; confidential or sensitive files may have been compromised, with no obvious symptoms on the infected computer. 4. It’s safe to reuse the same backup media every time you back up your data – Since the symp- toms of a virus infection may not be obvious, the files that were backed up last week, or even last month, could contain the virus as well. 5. If your computer has anti-virus software installed, you don’t need to worry about virus infec- tion – Today’s viruses, worms, and Trojan horses can sometimes elude detection by even the best Anti-Virus software; and if your virus definitions are not up to date, your exposure is greatly magnified. 6. Viruses are only transmitted through e-mail attachments – Some viruses are activated as soon as the infected e-mail message is opened, even without an attachment. 7. The only attachments that can hurt you are .exe files – There are more than 40 file types, or extensions, that may contain or spread a virus; some of the most common today are .com, .cpl, .eml, .exe, .pif, .reg, .scr, .vbs, and .zip. 8. It’s safe to open attachments from senders you recognize – Most e-mail messages that con- tain virus-infected attachments will appear to come from someone familiar to you; the virus “spoofs” the From address, to mislead the recipient into a false sense of security. 9. Viruses only come through e-mail – There are many other ways a modern virus can spread, including malicious links on Web sites, through Chat or Instant Messenger sessions, or across a Local Area Network (LAN); some generate random IP addresses and attempt to infect any computer with a corresponding address. 10. The Preview Pane is a safe, convenient way of previewing your e-mail messages – The Pre- view Pane in Microsoft Outlook or Outlook Express is a convenient feature, but it is also a major security weakness that has been exploited by numerous viruses. 11. Viruses can only spread to e-mail addresses in your address book – Viruses that do spread via e-mail look for the target addresses in other files on the infected computer; these may be files with an extension of .doc, .eml, .mdb, .xls, or those associated with other common office applications or databases. 12. Only Windows-based computers are susceptible to viruses – In a recent week, the National Cyber Alert System identified 90 new or updated vulnerabilities; of these, 12% targeted Windows systems, 50% affected Unix/Linux, and 38% affected multiple Operating Systems.