The new computer worm, named Kama Sutra, is scheduled to attack infected systems Friday, 3 February. The worm, also known as Blackworm, Nyxem-D and W32.blackmail.e, is aimed at Windows-based computers and spreads by copying itself to shared network locations and mass emailing itself to email addresses on these systems.
Though potentially quite damaging to a system, large scale infection of the worm is not expected and the current over-reaction by many members of the anti-virus community is unwarranted, according to anti-virus company BitDefender.
The Kama Sutra worm is designed to overwrite all .doc, .xls, .mdb, .mde, .ppt, .pps, .zip, .rar, .pdf, .psd, and .dmp files. It has gained the attention of the anti-virus community because of its ability to deceive Windows through phony digital signatures, and seems to have been created for the sole purpose of doing damage and not for commercial gain. It has also gained attention in both the general and technology press due to a unique Website that supposedly shows a running counter of infected computers, as well as its reliance on sexually suggestive emails which spread the virus.
Within the past week, a great deal of media attention has been given to the danger of this worm. While there is a potential of damage if a computer is infected, BitDefender, one of the first companies to offer a free tool for detecting and cleansing the virus from systems, believes that the worm is not as dangerous or widespread as has been reported and can easily be blocked with up-to-date anti-virus software.
Bogdan Dumitru, CTO, BitDefender, said, "Some members of the anti-virus community have initiated a wholesale panic around this threat, and we absolutely feel this is nothing but over-reaction. There is no doubt that this is an interesting virus due to the fact that we do not often see pure destructive viruses developed with no financial gain in mind anymore, and it has an interesting counter that shows how many systems are infected. But there is no reason to trust this site to be truthful. Without a suggestive name and a couple of neat designs, this worm is nothing more than a run-of-the-mill attack that anyone with anti-virus software will stop."
Extracted from [http://www.techtree.com/techtree/jsp/article.jsp?article_id=70996&cat_id=582]
Computer, Technology, Databases, Google, Internet, Mobile, Linux, Microsoft, Open Source, Security, Social Media, Web Development, Business, Finance
Subscribe to:
Post Comments (Atom)
Popular Posts
-
新加坡人口400万,亚洲人口4亿,全世界人口6亿。 但是,我一人可能就很有可能是世界最傻的了。我真是个不折不扣的大木头。真是受不了自己。
-
I recently wrote a code snippet to fill arrays with a value. The below method is a generic method that will accept different data types. Hop...
-
If you are working with PowerShell and need a fast way to list all files in a directory, including those buried in subfolders, this one-line...
-
*********** Try to sleep now, close your eyes Soon the birds would stop singing Twinkling stars, are shining bright They'll be watch...
-
Installed FortiClient recently but the challenge in disabling the application/service from running automatically on every start-up annoyed m...
No comments:
Post a Comment
Do provide your constructive comment. I appreciate that.