Đang chuẩn bị liên kết để tải về tài liệu:
Module 09 Viruses and Worms
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks. | M c EH Certified Ethical Hocker Ethical Hacking and Countermeasures Version 6 Module IX Viruses and Worms TM c E H News Certified Ethical Hacker FBI Warns of Valentine s Day E-Mail Virus Thursday February 14 2008 MX NEWS Happy Valentine s Day You ve got a computer virus IT managers around the world braced themselves Thursday for an expected onslaught of romantic e cards surreptitiously carrying the nastiest virus around the storm Worm. Once the user clicks on the e-mail link malware is downloaded to the Internet-connected device and causes it to become infected and part of the storm Worm botnet warns a public alert posted on the FBI s Web site Monday. Click here to visit FOXNews.com s Cybersecurity Center. The storm Worm virus has capitalized on various holidays in the last year by sending millions of e-mails advertising an e-card link within the text of the spam e-mail says the FBI. Valentine s Day has been identified as the next target. Haven t heard of the storm Worm That s because it hasn t struck yet even though researchers first noticed it more than a year ago after it cropped up in e-mails showing photos of damage from European windstorms in January 2007. Since then it s steadily infected an estimated 10 million Windows-based PCs around the world all underthe command of unknown bot herders whoVe silently fashioned them into a zombie army or botnet a massive network of enslaved PCs awaiting the signal to launch a cyberattack. ADVERTISEMENT SIX DEGREES COULD CHANGE THE WORLD NOW AVAILABLE n IN HD ON DEMAND l l CHANNEL HD Source http www.foxnews.com Copyright by Ec-Council All Rights Reserved. Reproduction is Strictly Prohibited EC-Council I M c EH Certified Ethical Hacker Scenario Ricky a software professional with a reputed organization received a mail which seemed to have come from some charitable organization. The mail was having a .ppt attachment with name demo of our charity work . Just before leaving for his home he downloaded and played the attached .