Page 17 - CG_v2.1_flipBooks_class_6
P. 17

Code Red Worm (2001) would spread itself with the message: “Hacked By Chinese!”
                    MyDoom Worm (2004) scraped addresses from infected machines, then sent copies of itself to
                    those addresses.

                    Storm  Worm  (2007)  attacked  millions  of  computers  with  an  email  about  approaching  bad
                    weather.
                    Zeus, also known as Zbot Trojan horse (2007) was made with an intention to steal banking
                    information of United States Department of Transportation.
                    Emotet  (2014)  is  considered  one  of  the  most  destructive  and  dangerous  Trojans.  It  spreads
                    through spam emails to steal banking information.

                    Pegasus (2016) is commercial spyware. It secretly infects a smartphone (Android or iOS) and
                    tracks the device completely for every action.
                 Harms Caused by Computer Malware

                 Different malwares will affect your computer in different ways.

                   They can crash your hard disk.

                   They can destroy all or some of your data.
                   They can decrease the processing speed of the computer.

                   They can reduce or block the memory of the computer or hard disk.

                   They can stop you from restarting your computer or keep on restarting your computer.

                   They can send e-mails from your account without your knowledge.
                 How does a Computer get infected?

                 Computer malwares spread through several ways. Some of them are:

                   using infected Extenal Hard Disk/Pen drives
                   opening an infected e-mail attachment

                   downloading an infected program from Internet or External Hard Disk/Pen drives
                   running an infected program (which can be a game, screen saver, etc.)

                   through local computer networks














                              Pen drive                     e-mail                      Computer game







                                                                                Safeguarding Your Computer     15
   12   13   14   15   16   17   18   19   20   21   22