Currently, computer technologies are pouring into our lives at such a speed that soon the whole world will be in their power.
Technology provides us with cheap production, computing, training, facilitating access to many resources such as information sites or banking services.
Soon, there may be automatic medicine, construction, mining. Of course, this will affect us very strongly, because, in fact, the history of modern mankind began relatively recently, which is why many are too careless about information security. They may not be afraid to enter passwords on other people's computers and save them, trust bank card data and much more.
Of course, the automation of life processes makes it possible for people to feel lighter. However, there are some problems that come with this.
It is made up of many factors: using the latest versions of anti-virus systems, timely system updates, virus scanning of media and downloaded data, security of publicnetworks such as Wi-Fi, etc.
It's so nice to sit down in some cafe for a cup of tea, connect a laptop or other device to an available, and most importantly - free network. But not everyone thinks about how these free and public networks can backfire after. The easiest thing is just to introduce a worm for the sake of a joke, but it's another matter if it is a Trojan that steals all the important data from the media and also locks the device.
There are more than a million attacks, spam mailings, botnet deployments and similar malicious activity every day in the world.
Information Threat Statistics 2017
According to Kaspersky Lab, there were 342,566,061 attacks. There were 33,006,783 unique URLs where the danger was found. Malware attempts to access bank accounts from the computer of the owner of 224,675 users. Ransomware attacks on computers of 246,675 users. Users' anti-viruses detected 185,801,835 dangerous objects. More than 2 million unwanted programs have been detected on mobile devices.
File viruses can easily arrange all this. And if you are a fan of traveling to dubious sites, the situation escalates even more. For example, some game should come out, but it is nowhere to be found. However, on such sites, the game can be found, but when downloaded, the virus that you launch will be downloaded, and there it is already a matter of technology.
Mobile devices and malware were also attackedinfiltrates your device and can steal your data. Particularly valuable are bank data, passwords and logins from sites, photos and much more. Of course, if you are not shy about anything, then leaking photos will not be a big tragedy for you, but finding bank card details can be a serious problem. It is unlikely that anyone would like to become a victim of carding. This is when they take your card details, buy something, then sell this thing to another person, that is, they launder money, usually such things are provided at a very big discount.
Importance of information security
A file virus is a code that can penetrate the body of a program file or document. The document contains macros.
The virus can be placed in any file format, be it a video, a music track, a game or programs from torrent trackers. It looks like a normal file format for its intended purpose, but in fact, in addition to the necessary data, there may be a "sewn".exe file there. Fortunately, there are a lot of instructions on the Internet for creating such media, take it - I don’t want to. Any "experimenter" can try his hand at this business, so the risk of encountering a virus is high.
For example, WannaCry and Petya (oh, those Russian hackers), who demanded for unlocking Bitcoin, can be noted from the most recent world viruses. Note that with the promotion and popularization of cryptocurrencies, cases of infection by hidden miners also followed.
Types of file viruses
They are divided into types:
- A non-resident file virus resides in a file, becomes active after launch, returns control to the program itself after execution. Infection occurs through a directory search.
- A resident file virus, in addition to infecting the executable media, also penetrates both external memory and PC RAM.
- Boot-file viruses attach themselves to the boot record of disks or floppy disks, as well as to program files. Activated after launch from media. Capable of infecting via portable media.
- Overwriting-virus forcibly copies its code into the file's code, so that the latter becomes unexecutable. Quickly detected as the operating system and programs stop working. It's hard not to notice.
- Parasitic-viruses change the contents of files, but do not affect or partially affect the performance. Can be recorded at the beginning, middle or end of the file.
- Companion viruses do not infect files, but create an infected twin that is activated when the main file is launched.
- File worms are independent. They reproduce and copy their parts on the carrier, and the user has already activated them.
- Link-viruses, when an infected file is launched, cause their own code to be launched.
- Viruses that infect compiler libraries and program source codes.
Possible current threats
Blockchain technologies are especially popular now. These are decentralized networksthe development of democracy, the rejection of state currencies and the emergence of a new world.
But there are some caveats. Until all this becomes ubiquitous, it is likely that most computers on the Web will become part of a botnet, and this will already be dangerous for the entire development of technology. Yes, many users put passwords on wallets, we are talking about crypto-activists, but not always, and many people store their assets on exchanges. All this can disappear in one moment, and "all power" will pass to unknown personalities. There are cases when crypto activists had their assets stolen, but this is their fault.
Unfortunately, many people don't realize that file viruses are something that can lead to dire consequences. However, with their help, the idea of a safe Internet is being promoted, because if people are attentive to information security, then the threats will not reach such proportions.
If we are talking about hidden miners, then it would be worth writing about them in more detail.
Let's dwell on their features. The hidden miner is aimed at office computers, since they are usually connected to the same network, which makes it easy to send a high-quality miner to one computer and infect the entire network.
They are called hidden for a reason, they are file viruses that may not even appear in the task manager or be reflected as a system file.
- They stress the computer and cause it to wear out faster.
- Limit performance.
- Personal data may be accessed.
Now imagine how this affects mobile devices. They might just stop working, or worse, just explode in your pants. File viruses are a big danger.