Call the exorcist admin guys! The chief accountant caught a powerful virus, everything is gone! A frequent, frequent situation based on the human factor, fresh virus trends and the hackers' determination. And really, why dig into someone else's software yourself, if you can rely on the company's employees in this.

Yes, the products of large public and private firms are constantly being hacked, although hundreds of experienced people are working on their creation and support.

And even more so, an ordinary person has nothing to oppose to hackers. At the same time, no one needs one lonely account, the goal of hackers is to get a large base of potential victims and process it with chain letters, spam or viruses. And we ourselves distribute all personal-public information right and left.

Latest Viral Trends

A distinctive feature of all recent viruses and hacking techniques is that they interact with a person, not with a system. That is, the victim herself starts the process. It is called " social engineering"- a method of illegal access to information, based on the characteristics of human psychology. And if earlier attackers had to turn into real detectives, tracking down their targets, communicating, sometimes even getting a job in a hacked company, now we can say thank you social networks. They greatly simplified and accelerated the process of collecting information.

By going through the VK, Twitter, FB and Instagram of your target, you can get the exact profile of a person with his phone number, mail, names of parents, friends and other details. And it's all free and voluntary - use it, dear!

What if scammers gain access to corporate mail one of your employees, spamming threatens not only everyone within the company, but also your customers. In another case, hackers will disable the employee's computer for a long time by sending some kind of "report" to the mail.

Hackers are planning attacks on those who work with valuable information - secretaries, managers, accountants, HRs.

Since restoring documents, systems, websites or getting passwords will cost you a pretty penny we need to understand what we are dealing with. So that all these "social engineers" cannot cash in on you, let's analyze one of the latest viral schemes.

"Cryptists"

The ransomware virus spreads through email under the guise of serious documents: court summons, invoices, requests from the tax office. And in order not to install it yourself, you need to look both ways. Our technicians specifically analyzed one such virus so we can show you what to look out for:

We follow the hands of these magicians:

  • Threatening title. "Notice to Appear in Court" means "Summon to Court". The guys are trying to intimidate and force the user to open the letter.
  • Sender's address - [email protected] It clearly shows that this is not an official letter, but a spammer / hacker.
  • Letter archive. There is a file there that should immediately alert you (the file name includes .doc, but the js extension - the virus disguises itself as a Word document)

Attention! If the computer was infected with ransomware, then with a probability of 95% the information will be lost forever. After downloading and launching a malicious file, a request is made to remote server from which the virus code is downloaded. All data on the computer is encrypted with a random sequence of characters.

To "decode" the files, you will need a key that only a hacker has. The fraudster promises to decrypt the information back for a certain amount, but it is far from certain that this will happen. What for? It is much easier to leave a person without money and without data: contracts, acts, orders, any valuable and sensitive information. So what do you do backups especially important documentation, you will sleep better. In this situation, this is your only 100% protection against viruses.

Pay attention to the above features, and you will be able to prevent dangerous cases of blocking computers and deleting important information. In any case, fixing the consequences of critical vulnerabilities will be much more expensive than taking precautions.

So here are 6 more tips for detecting viruses and preventing infection:

1. Update your operating system and programs regularly. Important updates that are automatically installed by default can be disabled. But don't, because new versions often close discovered holes in software security.

2. Install an antivirus and update the virus database regularly. Every day there are 100 thousand new viruses!

3. Enable the display of file extensions: Control Panel\Folder Options\View\Advanced Options, uncheck the option "Hide extensions for known file types" and click OK. This way you will always see the real file extension. Most often, masked viruses look like this: filename.doc.js and filename.pdf.exe. The real file extensions are js and exe, and everything before them is part of the filename.

4. Back up your important files - work documents and photos. Periodicity Reserve copy you need to choose depending on the frequency of file changes. For backup storage, you can use a cloud service if it allows you to return to older versions of files and set up manual synchronization. Then, in the event of a computer infection, the virus will not get into the cloud. We also recommend that you keep a copy of your important data in an archive. Most viruses cannot penetrate the archive, and all archived information is restored after the computer is disinfected.

5. Raise the professional literacy of your specialists! As we have already said, hackers tailor their attacks to our psychology, and constantly improve their techniques. Don't expect anyone other than your company and team to click/upload/enter your data. Anyone can get caught, the task is only to select the right hook for a person. Therefore, train your employees, at least individually, at least as a team, at least in a playful way, at least somehow!

6. Keep a close eye on letters in the mail, messages in corporate messengers and any other incoming information. Check senders' email addresses, attachments, and email content. Most viruses need to be run manually before they can harm your computer.

We really hope that you are reading this article for a preview, and not because everything is already bad. We wish you never to encounter total uncontrolled spam, missing documentation for six months and other pleasant consequences of caught viruses. Follow the six steps above, keep your eyes open and keep your information private!

Often sending viruses, trojans, spyware and other malware is conducted through electronic boxes. It is enough just to open the letter to read it, as the virus is activated and penetrates the computer. The consequences can be very different - from theft of passwords (both to social networks, and to e-wallets) until the data on the hard disk is destroyed. Therefore, it will be useful for each user to know how to check mail for viruses.

First of all, it is worth saying - if you prefer to use a mailbox on mail.ru, rambler.ru, yandex.ru and other serious servers, then you should not be afraid of getting a virus. These services have their own utilities for finding and eliminating viruses. Thanks to this, you are reliably protected from almost all malicious programs that exist today. If the mailbox is installed directly on your computer, it is enough to install an anti-virus utility that can scan mail - there are probably mentions of such an ability in the description. At the same time, make sure that the databases of the antivirus program are updated at least a couple of times a week. Either update yourself, or set it in the antivirus settings.

If you need to check some suspicious letter that came to your mailbox, just open the window of the antivirus installed on your computer. After that, specify the object of verification - one specific letter or the entire Inbox or Spam folder. The fact is that all mail applications create folders for storing incoming messages. For example, TheBat utility creates a Mail folder directly in its root directory. Good antivirus easily detect any code potentially dangerous for the computer.

If your mailbox received a letter that looks suspicious to you, but the utility did not detect any dangers in it, do not worry. Open the letter and examine the contents. If you see any links there, in no case do not follow them. Very often you will be promised a free download of new videos or a serious cash prize on the site. In practice, the only thing you get is a virus.

To maintain safety, it will be useful to ask friends or even regular internet forums dedicated to the problem of viruses and their distribution, about this mailbox. There you can learn more about how to check mail for viruses. If this mailbox is indeed being used to send potentially dangerous software, mark the incoming email as spam - you will no longer receive messages from this address.

215. File viruses infect:

graphic files

spreadsheet files

text documents

Executable files

service areas on disk

216. Macroviruses infect

Service areas of the disk

Programs that have a macro language

executable files

boot files

graphic documents

217. Bomb viruses are characterized by the fact that

infect executable files

not detected by OS tools

Do not have a breeding phase

do not have a permanent code

infect boot files

218 Stealth viruses are programs that…

amaze text files

destroy service areas on the disk

disturbed by unexpected messages

Cannot be seen by means of the OS

infect executable files

219 Destructive viruses destroy

executable files

Service areas on the hard disk

text files

Spreadsheet files

graphic files

220 Programs dubbed Trojan horses are

file viruses

Malicious codes

macro viruses

harmless programs

221 .Virus is

program that affects only system files

A program capable of performing unauthorized actions on a computer

program that destroys only boot files

program that disturbs unexpected messages

file hiding program

223 Computer viruses may affect

all answers are correct

Programs and documents

video files

sound files

graphic files

concept of physical structure hard drive Excluded

224 A virus in the computer may appear

when solving a mathematical problem

when connecting a modem to a computer

spontaneously

when archiving data

Will move from floppy disk

225 Infection with computer viruses can turn up

all answers are correct

Programs and documents

sound files

graphic files

video files

226 Computer viruses are…

Special Program small size that can attribute itself to other programs, it has the ability to "multiply"

disc check and repair program

disk defragmentation software

any program written in low-level languages

scanning software from a badly formatted floppy disk

227 Programs dubbed "Trojan horses" refer to:

harmless programs

file viruses

Malicious codes

macro viruses

228. A computer can become infected with a virus when:

Working with an "infected program"

formatting a floppy disk

launching an antivirus program

computer testing

restarting the computer

229 Specify non-existent type of virus

Installation viruses


boot viruses

macro viruses

viruses are companions

file viruses.

230 Viruses that infect files with the .com extension. exe

file viruses

installation viruses

Boot viruses

macro viruses

DIR viruses

231 Auditor program detects viruses...

periodically check all the files on the disk

controls important computer functions and ways of possible infection

tracks changes boot sectors disks

When opening a file, it calculates the checksums and compares them with the data stored in the database

by virus infection date

232 Specify a non-existent type of anti-virus software

Program screeners

program auditors

programs filters

programs detectors

doctor auditors

233 Boot viruses

Affects system areas of hard and floppy drives.

always changes the code of the infected file;

infects files;

always changes the beginning of the file;

changes the beginning and length of the file.

234 Purpose of anti-virus programs called detectors

detection and destruction of viruses;

control of possible ways of distribution computer viruses;

Detection of computer viruses;

“cure” infected files;

destruction of infected files.

235 Specify programs that are not anti-virus

Scanning programs

programs detectors

Phage programs

program auditors

all answers are correct

236 Infection with the "mail" virus occurs ...

When connecting to a web server infected with a "mail" virus

When opening an infected file sent with an e-mail

When using the Internet

When connected to mail server

When you receive an infected file with a letter sent by e-mail

First of all, we need to make a small digression about what is considered a virus. Now any program or file that an antivirus swears at is usually called a virus, although in reality it is not. A virus is a program that reproduces itself (copies itself many times) in order to infect as much as possible. more files and computers (network viruses). Everything else is just malware that is not capable of self-propagation. In order to exist, viruses need to somehow spread to other computers. Therefore, they are designed in such a way that, having penetrated one PC, they can move from it to others. This is how infection occurs. 

The first group includes boot viruses. This method of penetration is quite common. Any of the storage media (flash drive and memory card, floppy disk, CD-DVD, HDD) has a boot sector. When you turn on your computer, the first thing it reads is boot information. If the boot information is contained on the disk, then the computer uses it on its own to correct operation. However, if the disk was infected with a virus, then even from the CD it immediately enters the computer, activating itself. Most of these viruses "live" on the user's PC for a long time without detecting themselves. They are designed to be distributed on the network, and they do not harm your computer. Malicious programs often have a kind of sensor: they activate themselves at the time allotted for them ( New Year or Halloween). This is done in order to accumulate a sufficient mass of infected computers and antiviruses do not interfere with this. However, some viruses begin to harm as soon as they enter the PC. They are often programmed for full formatting(clear contents) of your PC disk.

Programs for infecting files belong to the second group. The virus remains in the computer's memory immediately after launching the application that was infected. If this virus is not removed, then all applications that you open on your PC will be infected automatically. This will lead to an increase in the number of dangerous applications. Infection of several applications at once is very harmful to the system. As a rule, files that have been infected may not cause problems for a while. This is precisely what they are dangerous for: during the time that the applications will work normally, the virus will have time to destroy the entire system. Incorrect saving of file names or partial memorization of contents is the first sign that the computer is infected. Programs belonging to this group impair the performance of all programs that are used to transfer information with other users or computers on the network. For example, the transfer of office documents, screen servers, applications that allow you to work with mail and compressed files that decompress themselves are the first to suffer. 

"Mail" viruses make up the group of the most dangerous and widespread programs for damaging computer software. An email with a file attached to it is the most common carrier of viruses. If the computer was infected in this way, then the user will continue to send viruses by simply attaching the file necessary for sending to the letter. At the same time, he will not even guess that when attaching an application, the virus attaches itself. After opening the letter, the procedure is repeated. You should pay attention to letters from users you do not know. But even if the author of the letter is familiar to you, he may be a distributor of viruses without knowing it. Therefore, if you receive an email with attached animations, jokes, spreadsheets, greeting cards, photos or documents, check the email for viruses. Often such viruses independently send out infected emails to all users whose emails are stored in the computer's memory. Thus, while spreading, the virus harms the reputation of the user. That is why, before opening a letter, you should learn as much as possible about it. Even letters from well-known people are best checked with an antivirus. This is the only way to protect your computer and the computers of other users from infection with various kinds of viruses. useful links

The Internet is a universal virtual space that has given humanity a lot of amazing opportunities. Today it is difficult to imagine a time spent without using the Internet or its services. This is such a huge space that already contains billions of different sites and communities, portals and forums, and much more. But, as is usually the case, with great opportunities come global challenges. And the first danger that arose because of the Internet was the opportunity to engage in hacking. Today, there are entire communities around the world that are actively engaged in illegal activities and constantly steal data or cause panic, both among ordinary users and large companies. An example of this is the huge company Sony, which at one time was subjected to a massive attack by hackers and could not resist. As a result, the personal data of 77 million PlayStation system users were stolen from them. But not only Sony is a victim of these intruders. Every day hacker attack many companies, websites, databases and other constituent elements that use the Internet are exposed.

But, hackers, this is not the only modern problem, in addition to them, there are also virus attacks that have a much larger scope. These viruses can harm several million users at the same time. One careless use of a program with a virus can endanger entire cities and countries. To fight viruses and protect your computer, you can use the tips on this page. And today we will analyze the most terrible viruses in the history of the computer world.

Morris Worm

This is the legendary and very first virus that was created by Robert T. Morris sometime in 1988. The creator himself did not want to harm Internet users, he just wanted to measure the scale of the entire network in the world, as a result, he caused harm, which was estimated at several tens of millions of dollars. The result of his curiosity was the defeat of Internet nodes, the number of which exceeded 5000 pieces. What is most interesting, his virus not only hit these Internet sites, it completely paralyzed them, depriving them of any opportunity to conduct activities, which is comparable to a simple shutdown. For those times, the defeat of so many nodes was just a global catastrophe.

Melissa virus

Another representative of the most dangerous viruses, which, oddly enough, is named after a stripper. This virus instantly hit the top companies in the world, including even Microsoft with their supposedly incomparable protection. But after the attack of the virus, Microsoft had to close all its mail gateways to prevent active infection with this virus. So it was through them that the global infection of users went.

ILOVEYOU mail virus

The simplest virus, which was developed in the Philippines in 2000, turned out to be in fact frightening and destructive. This is the first mail virus faced by humanity.

The virus was a simple letter that came to the user. With the intriguing title "I love you", of course, everyone was curious to look into it, but in the end it seemed empty. Although this emptiness was only at first glance. In fact, a special ".vbs" script was hidden in the letter, which was activated after opening the letter and distributed itself (again in the format of the letter "I love you") to all users, the addresses that were mentioned in the mailbox of the affected user. As a result, the chain of this virus has spread almost all over the world. The total damage from it amounted to almost 15 billion dollars.

And, based on the fact that this damage was of such magnitude, the ILOVEYOU virus was included in the Guinness Book of Records.

Worm Code Red

Code Red is the founder of the appearance of viruses classified as "worms". It showed itself on July 13, 2001, when a mass attack was carried out by users of a well-known and popular server at that time, which had the name "Microsoft IIS".

The worm actively penetrated the very core of the server and began to act out there, to be more precise, it replaced all site data with the phrase embedded in it. And, when users opened a site where the Code Red worm had penetrated, instead of information, they displayed the phrase “Hello, the site was hacked by the Chinese!”. Thus, hundreds of projects were disrupted and the performance of many companies was disrupted. The total damage from the virus amounted to almost 2.6 billion dollars.

Virus worm Nimda

A curious coincidence occurred with a certain virus called "Nimda". The fact is that he appeared exactly when the tragedy occurred in the United States. The sad fate of the two twin towers where the plane was sent. As a result, there were hundreds of victims and huge destruction. It was at this time that he appeared this virus. Therefore, he is prescribed a terrorist origin, allegedly, with the help of this virus, the terrorists continued to terrorize the population.

The purpose of the virus was to infect as many users as possible, as a result, the United States suffered a loss of 635 million dollars.

SQL Slammer

SQL Slammer is another piece of malware that has managed to break into Microsoft system and infect most users. The infection went through an unnoticed hole in SQL, which allowed the virus to spread freely and spoil the performance of Internet browsers. It slowed down or completely cut off the Internet.

MS Blast virus

MS Blast is the most dangerous virus in existence. With the right combination of circumstances, he is able to infect Windows users through a special system update system. But it does not just infect users, it completely paralyzes the system, thereby disrupting the operating system.

Mydoom mail virus

Another representative of a seemingly empty and harmless letter. Many users received a strange letter in the mail, opening which, the user found the message "I'll just do my job, nothing personal", after which the user was blocked from accessing Microsoft's web resources, specialized anti-virus resources (and their applications) and news portals.

Worm Sasser

A practically harmless, but highly contagious and annoying virus called Sasser caused a lot of trouble. After the virus penetrated the user's computer, it infected others computing machines, or rather, he was looking for any ways to get into other computers, which he did just fine, so he infected great amount computers. The only thing he could harm was a simple reboot of the computer, which took place when he liked.

Witty virus

BlackICE, a popular firewall at the time, turned out to be a source of danger for all its users. The fact is that he had one small error in the protection, which allowed the attackers to spread the Witty virus. Hundreds of thousands of users were affected by this massive infection. The virus penetrated their computers and filled the free space on their hard drives with arbitrary data.