Sunday, November 24, 2013

Spähprogramm: NSA to 50,000 networks have infiltrated the world - Spiegel Online

malicious and spyware

Click on keywords to find out more


How Trojan Horse in Greek mythology hide computer trojan their actual task (and harmfulness!) behind a cover. They usually occur as a harmless software: screensavers, video file access program. They are, for example, as an e-mail attachment widespread. When you launch the program so that always puts a hidden malicious function: Most of these consists of the opening of a so-called Backdoor , a back door that opens the computer system over the Internet and through other malicious programs reloaded.


computer viruses infect existing files on the computers of their victims . The host files work – at least for a while – to continue as before. Because viruses are not to be discovered. They spread not independent but are dependent on that computer users to pass on infected files, send by e-mail, copy to USB sticks or set in filesharing . Of the other pollutants and Spähprogrammen a virus differs only by the spread method. What damage it causes depends solely on the will of its creators from.


The small compound performs the words “root” and “kit” together: “root” is at Unix systems of users with administrator rights, the right to intervene in the depths of the system. A “kit” is a compilation of tools. A rootkit is thus a set of programs that are equipped with full access to the system of a computer. This allows the rootkit extensive manipulation, without that they can be perceived, for example, virus scanners. Either the rootkit contains software that disables such as security scanners, or it builds a so-called Shell on which the operating system hides as a kind of mini-operating system any suspicious act in front of the computer. The majority of the outstanding rootkit is used to reload Trojans , viruses and other additional malicious software on the Internet. Rootkits are among the hardest trackable compromises of a computer.


computer worms are in practice tuned, lowered variant of the viruses and Trojans. In the strict sense, only one program is described with the concept that ensures its own distribution – and the programs that it transports. Worms included as a core malicious program , which ensures, for example by initiating their own e-mail program for the retransmission of an affected computer. Your main means are thus the communicative way of the Web: E-mails, chats, AIMs , P2P Exchanges and others. In practice, they are often used as a vehicle for the dissemination of various other types of malicious programs.


Under a drive-by refers to the influence a computer or even infecting the PC by the mere visit of a contaminated web page. The method is for some years very trendy: Taking advantage of current vulnerabilities in browsers and using scripts a stored on a web page malicious code has an influence on a computer. For example, viruses are distributed, installed sniffer programs, redirected browser requests to Web pages that pay for it and more. Drive-bys are particularly insidious because they require the pc users have no activity (such as opening an e-mail), but only carelessness. Victims are mostly users who do not keep their software current with constant updates -. Thus potentially as good as any


botnets are kidnapped computer networks – the bots. With the help of trojan programs that they inject, for example by means of manipulated web pages or fake e-mails on the computer, the botnet operators gain access to foreign computer and can control them via the Web. Such botnets for rent, a profitable business can be. The zombie armies be used, among other things, to send millions of spam messages to force through a variety of simultaneous requests web pages in the knee or graze passwords on a large scale. (More at SPIEGEL ONLINE)

Fakeware, ransomware

The word is composed of “fake”, so “fake”, and ” goods “, the short form software together: It is about ” wrong software “. This refers to programs that claim to perform a certain action but in fact do something completely different. Most common form: alleged IT security programs, or virus scanners. In its most benign variant, they are useless, but annoying: you constantly warn against any non-existent viruses and try the PC users to move to a purchase. As adware programs pester the user with advertising

The most perfidious form but is ransomware . Kidnaps you the computer literally makes him hostage. It hinders or prevents the normal functioning, invites viruses from the net and makes demands on a “cleaning fee” or release fee, which is nothing more than a ransom: Only when you pay, you can work with the computer again. War 2006/2007 often, but has since declined.

Zero-day exploits

A zero-day exploit uses a software vulnerability already on the day on which the risk is even noticed. Typically, manufacturers of protective software and the authors of malicious programs provide a head-to-head race at the plug, sealing and exploiting become known vulnerabilities.

risk number one: User

The biggest security risk in the world of computer sitting in front of the computer. Not only lack of discipline in necessary software updates do not make users dangerous: He also has a great taste for free music from obscure sources, funny file attachments in e-mails and a great communication pleasure in the oh-so-informal chat space of the web. Most damage in IT are likely to be caused by user-fingers on the mouse buttons.

DDoS attacks

So-called distribuierte denial-of-service attacks (DDoS) attacks are, where individual servers or networks with a flood of requests from other computers are overloaded until they are no longer accessible. Commonly known as botnets for such distributed attacks in use today, interconnected computers, often thousands or even tens of thousands, are controlled remotely by a hacker or an organization.

No comments:

Post a Comment