The I Love You Bug And Its Concerns

Improved Essays
The newfound “I Love You” bug that cleared through banks, securities firms, and Web organizations in the United States Thursday and later produced copycat infections has turned out to be a greater amount of an irritation than an expensive disturbance of business. The “I love you” bug caused harm, in any case, at organizations that make overwhelming utilization of sight and sound documents, for example, magazines and publicizing offices, since it overwrites picture records with “jpg” expansions and MP3 music records.

Overview Of The “ I Love You ” Bug and Its Concerns:
What’s more, the infection could bring about some security breaks weeks or months from now since it can take system passwords from a PC and send them to a remote area, security
…show more content…
Handfuls more copycat assaults are normal, security specialists said.

The I Love You infection spreads rapidly among clients of Microsoft Outlook and corporate systems that utilization the Microsoft Exchange email server since it sends a duplicate of itself to each email address in a beneficiary’s Outlook address book. By differentiation, the “Melissa” infection, which spread far and wide in March 1999, sent itself just to the initial 50 individuals on a casualty’s location book.
Once dispatched, it downloads an executable secondary passage program from one of four Web destinations. That program, Win-Bugfix, takes passwords put away on that PC and sends them to an email address in the Philippines.
In the event that a man whose PC has been contaminated with I Love You utilizes the prevalent Internet visit program mIRC, the infection will endeavor to transmit itself to each client who enters the talk room, Rouland

Related Documents

  • Improved Essays

    In 2014 hosts downloaded malware every 6 minutes In 2014 hosts accessed a malicious site every 24 seconds Corporate Data at Risk When mobile security is weak, it can provide attackers with personal information, passwords, business and personal email, corporate documents, and access to company networks and applications. In the business setting, that concern becomes magnified. In fact, 87 percent of IT professionals say careless employees are a greater threat to security than cybercriminals. And, 92 percent say employee behaviors could have made a difference in preventing high-profile security…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As our text states, “it is common to see users having blank passwords, the word password, their pet’s name or children’s names, or their place of birth as a password” (Dhillon p.72). This is why it is necessary to have strong password standards and communicate them to all the users. Also, it was found that real-time virus scanning software was turned off, allowing the hacker to install the malicious software. This change did not proactively alert (email or text)…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As part of the overall risk model, we have already illustrated the threats and attacks that are possible on the Costco’s IT infrastructure with the likelihood of attacks that can exploit the identified vulnerabilities, which may eventually pose an extensive threat to the Costco’s operations including missions, functions, image, and reputation as well as to the organizational assets, linked organizations, and the consumers. Costco’s privacy policy clearly enunciated the significance of customer’s private and financial information for the organization, and promises to maintain the technical competence to safeguard the information collected through their websites, point of sales terminals, and other mechanisms (Costco, 2013). Consequently, to…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    First of all, Peter is a teenager who has always been a wealthy kid, and a computer genius. Things get out of hand when people break into his house, and take his computer with all his personal information. As a consequence to the breakin, Peter takes action, by ”Posting the same message across more than a dozen boards, accessed by thousands of members of the hacker community” (Gagnon 129). This shows that by sending a message around the world to all his fellow hackers, he is…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Mepcom's Disappearance

    • 154 Words
    • 1 Pages

    Recently, there have been instances where software systems we depend on to process applicants have let us down. This appears to be happening more often than not, almost on a daily basis even! It is in actually not our fault, and generally not MEPCOM’s fault. Big Army is mandating security protocols for hardware settings, and security updates to both workstation software and server software.…

    • 154 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The internet has allowed for many great advances in data storage and availability, but these positive aspects are checked by the negative ones, namely, how easily lies are spread and…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    I read chapter 7: Phony Sites and Dangerous Attachments in The Art of Deception by Kevin D. Mitnick and William L. Simon. This chapter was about unsafe sites you may visit and unsafe attachments you may receive in an email. An attacker will do whatever is necessary to break into a network. Computer viruses can do a lot of damage to your computer. Many people have created a software to prevent a virus from harming computers.…

    • 1229 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    They can also create audio books for people who are on the move and find it difficult to read from a traditional book or even a digital copy. The company must channel their energy into cybersecurity for the future and not focuses on incidents and how to deal with them after the fact. But focus their concerns on prevention with an investment in a better cybersecurity system. Their action is surprising in a world where there is a continued battle between hackers and various societal actors attempting to protect their systems. Cybersecurity is said to be the new form of war and is viewed as the next platform in modern warfare (Bruijn & Janssen, 2017).…

    • 1952 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Even with the public becoming more aware and advances in security based technology, that number continues to rise as the number of breached businesses continues to rise yearly (Doshi & Trivedi, 2014). Target Corporation experienced a security breach in 2013, which occurred because a vendor gained access to the internal Target networks via the network connections available through the HVAC systems affecting more than 70 million customers (Gray & Ladig, 2015). Another notable breach, Adobe Systems, began in July 2013 and went undetected for two months costing the company untold amounts of money because their products’ source code was released on the Internet, while in Neiman Marcus’ case, the breach saw 350,000 of their customers’ credit cards stolen and fraudulently used (Silverman, 2016). Home Depot’s payment system was breached affecting customers that shopped at any of their 2200 stores, while Apple’s breach involved attackers hacking personal accounts to steal pictures from celebrity accounts (Kenealy, 2014). Other breaches include Nationwide Mutual Insurance, Zappos, Trustwave Holdings, PF Chang’s, and Linked In (Silverman, 2016).…

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Ransomware Essay

    • 1262 Words
    • 6 Pages

    Information systems and the data they produce and store can save lives and start wars, among a multitude of other things. Because of this, information systems present a tempting target for attackers wishing to use them for personal gain, either through hacking or malicious software. One particular type of malicious software has been on the rise in recent years: ransomware. This paper will examine what ransomware is, how it has developed over the years, the effects it has, and how it can be prevented and dealt with.…

    • 1262 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Security Breaches Essay

    • 309 Words
    • 2 Pages

    Security experts have defined the problem of information security as a fine balance between data protection and information accessibility (McCune, 1998). For the personal computer user, the impacts of security breaches are relatively contained. The personal computer is generally a single entity, and the user manipulates the system through the application of software and the use of the Internet. When a breach in security occurs, such as access to passwords or viruses, the impact is not spread beyond the user’s own workspace. Although the damage done through breaches of security for personal computer users can have colossal impacts for the user, there are no widespread repercussions.…

    • 309 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This last summer I was challenged with the reality of friendship. Friends are relatable, trustworthy, reliable people who are close to you. I learned the hard way that who I thought were my friends were really my worst enemies. I’d made new friends in the eighth grade.…

    • 423 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Game Board For Children

    • 2180 Words
    • 9 Pages

    The resource of Recycle sorting with game board, it is developed into two parts which can be used separately or together depending on the age of the children. The first section of the resource is the game board. The game board is shaped in a snake type design, using colour coded tiles on the game board to distinguish which card is to be picked up and to be considered for the children to determine whether they fit into the rubbish, recycle or the compost bin. Other tiles have been marked, such as return to the start of the game. move back and move forward a certain number of spots on the game board; this is to enable a longer length of time for the game to be played.…

    • 2180 Words
    • 9 Pages
    Great Essays