Welcome!

Open Source Cloud Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White, Rostyslav Demush

Related Topics: Cloud Security, Java IoT, Microservices Expo, Open Source Cloud, Machine Learning , Agile Computing

Cloud Security: Article

The Ten Things You Didn’t Know About Malware

Malware – no computer wants it but researchers estimate that the majority of computers have it

But what is malware and what makes it so particularly bad for your PC?

Malware - short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.

Below is a list of the top ten things you may not, but should, know about malware. The list also gives a few examples of particularly nasty pieces of malware, which will make you think twice about clicking on those "scandalous photos or attachments" in the future.

  1. A virus and malware is not the same thing - computer viruses are small programs or scripts that can negatively affect the health of your computer. These programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks.
  2. New variants and mutations of malware are being released at easily double the speed that software is built to remove them.
  3. Myth - you can't catch something merely by visiting a website. Reality - a drive-by is program that is automatically installed in your computer by merely visiting a website, without having to explicitly click on a link on the page. Typically, they are deployed by exploiting flaws in the browser and operating system code. Keep your browser up to date.
  4. As of May 2013, there were approximately 22,950,378 viruses and pieces of malware being detected each day. This is increased by over 5 million since April 2012 so it looks like the problem is getting worse, not better.
  5. Beware of packages that come from strangers - one of the top social engineering tactics used by the bad guys in email is to send you a notice that you've received a package. If you don't recognize the sender, you may want to delete the email or copy down the reference number, if there is one, go to the site and then enter it. In general, if you receive an email from a name you don't recognize, be wary of opening any attachments.
  6. Beware clicking on links that offer to take you to videos of recent "disasters" - most recently, spammers took advantage of the attention garnered by the Boston Marathon bombing and the fertilizer plant explosion in Texas and used two major botnets to inundate users with messages that purport to link to videos of the tragedies. People who followed the link had several pieces of malware installed on their laptops.
  7. As of January 2013, there were over 350,000 pieces of malware targeting the Android operating system and experts have estimated they expect it to reach 1 million by 2013.
  8. Another particularly nasty piece of malware was the Moneypack scam. The malware would appear on user's computer screens pretending to be an official FBI alert, telling users that their computer is blocked due to Copyright and Related Rights Law violation. The alert attempted to trick users into believing that they have illegally visited or distributed copyrighted content such as videos, music, and software. The user's system is then completely locked down and they are told that services will only be available after a $200 fine is paid. The fine is of course going to the cyber-crime, not the FBI.
  9. A renowned phishing page called Loyphish disguises itself as a legitimate banking webpage and attempts to trick users into filling in their confidential banking information into an online form. Unsuspecting victims thought they were submitting their information confidentially to the bank but they were actually submitting their information to a cyber criminal.
  10. The amount of Mac-specific malware remains fairly small in comparison with other platforms. However, the figure is currently on the rise and it is only going to get worse. Hackers originally targeted Windows because the huge number of users, however, as Mac regains its share of the market, things are likely to change. In May 2013 researchers uncovered the Hangover malware which was involved in high-profile attacks on governments. Researchers predicted the attack had been going on for over three years and that it was thought to be the act of a private-sector group.

As has been shown, malware comes in all shapes and sizes and is often full of lots of nasty surprises. It is therefore recommended that if you feel suspicious about something online, the best option is to steer well clear of it.

Installing a good antivirus is also advised but users should not solely rely on this for protection - it is up to them as well.

After all, your first line of defence is always yourself.

More Stories By Brian Laing

Brian Laing, author of "APT for Dummies," is vice president of AhnLab, where he directs the US operations of this internationally known security and software leader. He possesses a distinct mixture of technology, business and creative expertise drawing on more than 15 years of industry experience. Companies have benefited not only from his “big picture” vision, but also from his understanding of the interconnected pathways that accompany it. Before joining AhnLab, Brian founded Hive Media where he served as CEO. He previously co-founded RedSeal Systems, and conceived the overall design / features of the product. He was also founder and CEO of self-funded Blade Software, who released the industry’s first commercial IPS/FW testing tool.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo at the Javits Center in New York City, NY.
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...