Home > Articles > Security > Network Security

Unwitting Collaborators, Part 10: System Hijacking  Worms, Viruses & Trojan Horses

  • Print
  • + Share This
For years, the electronic world has been inundated with both viruses and virus hoaxes, and yet we don’t seem to be learning our lesson. The top 10 viruses still in the wild all have published remedies, but most of them are continue infecting our networks. Malicious code is becoming more sophisticated and attacking more than just Windows-based machines. Learn how hackers get access with these tools, and what to do about them.
Like this article? We recommend

Introduction: Tools of the Cyberterrorist

Worms, viruses, and Trojan horses used to penetrate the computers of unwitting victims have been around for a long time. Although worms, viruses, and Trojan horses are "oldies but goodies" in a hacker's kit bag, they still can deliver a damaging payload. And now, more ominous forms are appearing that can make previous virus attacks seem like a walk in the park.

The sad part of all these types of attacks is that many known viruses are long-lived because infected users either don't know they're infected or engage in practices that lend themselves to constant re-infection by the same or new viruses. If you look at McAfee's list of the top 10 viruses, you'll see entries for viruses that are over a year old, and yet still make the top 10!

  • + Share This
  • 🔖 Save To Your Account