Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

Worm_Grew.A Threat, Hype, or Dud?




By Darren Miller

Title
-----
WORM_GREW.A: Threat, Hype, or Dud?

The Worm_Grew.A Virus Got Allot Of Attention
----------------------------
The 3rd has come and gone. What has been the real effect or impact of the "WORM_GREW.A (Also know as Nyxem, BlackMal, MyWife, and so on)" virus? For weeks there has been tons of warnings, in the news, print, e-zines, you name the forum and it has been a discussion topic. Current information indicates that the WORM_GREW.A virus has not caused mass destruction as promised or suspected. I'm sure some of those 600,000 or so suspected infected computers were impacted, but who really knows at this point.

Viruses Can Impact You In Various Ways
--------------------------
There is one thing I do know however; Even if the BlackMal virus has not done as much physical damage as predicted, it has done a good deal of indirect damage. Think about how much time corporate technical people have spent preparing for the possibilities, making sure their enterprise anti-virus solution is functioning properly, the time devoted to discussing and planning for disaster recovery in the event a direct impact is realized. What about all the home and small business people stressed about the doom looming over their computers head in the form of a "possible" destructive and wide spread infection.

How Do You Know If Your Business Is Protected Against Viruses
--------------------------------------------------
A business associate of mine recently worked on a project in which he performed a complete infrastructure upgrade for a document / information heavy business. During the upgrade, he found that the anti-virus solution they were using was not functioning properly, had not updated its virus signatures for eight months, and on top of this, their very expensive tape backup solution had not been working for about as long. The customer kept changing the tapes, but they were blank. Just imagine what would have happened if they had not had this upgrade done, and an effective anti-virus and tape backup solution put back in place. If they had contracted this virus it could have not only shut them down for a period of time, it very well may have cost them huge financial losses or worse.

Virus Threat, Hype, or Somewhere in Between
----------------------------
Do I think this particular virus scare is a product of a real threat, fueled by hype, or a dud? Quite frankly I think it has been a little of all three. The threat was / is definitely real, the hype was all over the media and other information outlets, and as far as being a dud, if you analyze it using the equation threat+hype= impact, maybe.

I think what really has set this virus apart from recent malware / threats, is its destructive capabilities. Many malware developers have moved away from creating destructive worms and viruses in favor of creating cash generating malware. There's no money in it for them if they just blow up your system.

Conclusion
----------
It's quite interesting, the parallel between how we deal with threats and risks in our personal lives, and that of the technology world. Many of us only prepare for a negative or damaging event shortly before the event takes place. That is if we have been warned with time to prepare. The bottom line is we can never let our guard down. Consistency, persistence, awareness, and preparedness need to be in the forefront of our minds.

You may reprint or publish this article free of charge as long as the bylines are included.

Original URL (The Web version of the article)
------------
http://www.defendingthenet.com/newsletters/Worm_Grew.A-Threat-Hype-Or-Dud.htm



 
 
About the Author
----------------
Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at Darren.Miller@defendingthenet.com. If you would like to know more about computer security please visit us at http://www.defendingthenet.com.

Article Source: http://www.simplysearch4it.com/article/21259.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/21259.html" as shown above and make it hyperlinked.



  Some other articles by Darren Miller
My Identity Was Stolen Because Of Someone Else's Mistake
Giving Total Strangers Your Personal Information ---------------------------- How often would you say you trust total strangers with some of your most confidential information? I think I ...

Step Away From The Computer Before You Have A Mental Meltdown
Do I Read A Technical Manual Tonight, or The Lord Of The Rings? ---------------------------- Just out of courtesy, I think I should tell you that the following article ...

Finding Your MAC Address On Wired And Wireless Network Cards
The Answer To The Media Access Control Question ---------------------------- Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control ...

What Are Survivable Computer Systems
Definition Of A Survivable Computer System ---------------------------- A computer system, which may be made up of multiple individual systems and components, designed to provide mission critical services must ...

Is Your Data Encryption Really Secure
How Do You Know Your Data Encryption is Really Secure ---------------------------- There are various types and methods of data encryption. Some of the most ...

Why Easy To Use Software Is Putting You At Risk
Can Easy To Use Software Also Be Secure ---------------------------- Anyone who has been working with computers for a long time will have noticed that mainstream operating systems and applications have become easier to use over the ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Can't connect to database