Zotob
   HOME
*





Zotob
"The Zotob worm and several variations of it, known as Rbot.cbq, SDBot.bzh and Zotob.d, infected computers at companies such as ABC, CNN, The Associated Press, ''The New York Times'', and Caterpillar Inc." — ''Business Week'', August 16, 2005. Zotob is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000, including th MS05-039plug-and-play vulnerability. This worm has been known to spread on Microsoft-ds or TCP port 445. It was declared that the Zotob worms cost an average of $97,000 as well as 80 hours of cleanup per company affected. Rbot variant Zotob was derived from the Rbot worm. Rbot can force an infected computer to continuously restart. Its outbreak on August 16, 2005 was covered "live" on CNN television, as the network's own computers got infected. Zotob would self-replicate each time the computer rebooted, resulting in each computer having numerous copies of the file by the time it was purged. This is similar to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Farid Essebar
Farid Essebar ( ar, فريد الصبار) (born in 1987, known as Diabl0) is a Moroccan black hat hacker. He was one of the two people (along with Turk Atilla Ekici) behind the spread of the Zotob computer worm that targeted Windows 2000 operating systems in 2005. Among the affected were CNN, ABC News, ''The New York Times'', Caterpillar, United Parcel Service, Boeing and also the United States Department of Homeland Security. Microsoft used 50 investigators and had put a $250,000 reward for the capture of the hacker(s). Microsoft's General counsel declared on August 26, 2005 that "The fact that we were able to see these arrests in less than two weeks and see them halfway around the world really drives that point home." Essebar is a Russian citizen, also. Arrest Intentions It is believed that his intention was to facilitate credit card forgery scams. The FBI believes that Atilla Ekici paid Farid Essebar to code the worm. Other accusations In July 2006, investigators stated ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Farid Essabar
Farid Essebar ( ar, فريد الصبار) (born in 1987, known as Diabl0) is a Moroccan black hat hacker. He was one of the two people (along with Turk Atilla Ekici) behind the spread of the Zotob computer worm that targeted Windows 2000 operating systems in 2005. Among the affected were CNN, ABC News, ''The New York Times'', Caterpillar, United Parcel Service, Boeing and also the United States Department of Homeland Security. Microsoft used 50 investigators and had put a $250,000 reward for the capture of the hacker(s). Microsoft's General counsel declared on August 26, 2005 that "The fact that we were able to see these arrests in less than two weeks and see them halfway around the world really drives that point home." Essebar is a Russian citizen, also. Arrest Intentions It is believed that his intention was to facilitate credit card forgery scams. The FBI believes that Atilla Ekici paid Farid Essebar to code the worm. Other accusations In July 2006, investigators stated ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Windows 2000
Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RTM), released to manufacturing on December 15, 1999, and was officially released to retail on February 17, 2000. It was Microsoft's business operating system until the introduction of Windows XP Professional in 2001. Windows 2000 introduced NTFS 3.0, Encrypting File System, as well as basic and dynamic disk storage. Support for people with disabilities was improved over Windows NT 4.0 with a number of new Assistive technology, assistive technologies, and Microsoft increased support for different languages and Locale (computer software), locale information. The Windows 2000 Server family has additional features, most notably the introduction of Active Directory, which in the years following became a widely used directory service in business environmen ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

American Broadcasting Company
The American Broadcasting Company (ABC) is an American commercial broadcast television network. It is the flagship property of the ABC Entertainment Group division of The Walt Disney Company. The network is headquartered in Burbank, California, on Riverside Drive, directly across the street from Walt Disney Studios and adjacent to the Roy E. Disney Animation Building. The network's secondary offices, and headquarters of its news division, are in New York City, at its broadcast center at 77 West 66th Street on the Upper West Side of Manhattan. Since 2007, when ABC Radio (also known as Cumulus Media Networks) was sold to Citadel Broadcasting, ABC has reduced its broadcasting operations almost exclusively to television. It is the fifth-oldest major broadcasting network in the world and the youngest of the American Big Three television networks. The network is sometimes referred to as the Alphabet Network, as its initialism also represents the first three letters of the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Security Now!
''Security Now!'' is a weekly podcast hosted by Steve Gibson and Leo Laporte. It was the second show to premiere on the TWiT Network, launching in summer 2005. The first episode, “As the Worm Turns”, was released on August 19, 2005. ''Security Now!'' consists of a discussion between Gibson and Laporte on issues of computer security and, conversely, insecurity. Covered topics have included security vulnerabilities, firewalls, password security, spyware, rootkits, Wi-Fi, virtual private networks, and virtual machines. Podcast feed ''Security Now!'' is distributed via its main podcast RSS feed and on the GRC ''Security Now!'' page. In addition to audio, text transcriptions are published, along with Gibson distributing a low-bandwidth 16 kbit/s version of the show on his own for those with low-bandwidth sources such as satellite internet or dial-up. The podcast runs for approximately two hours, typically starting with security news. Then Gibson reads a testimonial for his so ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Timeline Of Notable Computer Viruses And Worms
A timeline is a display of a list of events in chronological order. It is typically a graphic design showing a long bar labelled with dates paralleling it, and usually contemporaneous events. Timelines can use any suitable scale representing time, suiting the subject and data; many use a linear scale, in which a unit of distance is equal to a set amount of time. This timescale is dependent on the events in the timeline. A timeline of evolution can be over millions of years, whereas a timeline for the day of the September 11 attacks can take place over minutes, and that of an explosion over milliseconds. While many timelines use a linear timescale—especially where very large or small timespans are relevant -- logarithmic timelines entail a logarithmic scale of time; some "hurry up and wait" chronologies are depicted with zoom lens metaphors. History Time and space, particularly the line, are intertwined concepts in human thought. The line is ubiquitous in clocks in the f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. By contrast, software that causes harm due to some deficiency is typically described as a software bug. Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Many types of malware exist, including computer viruses, worms, Trojan horses, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Black Hat (computer Security)
A Black Hat (Black Hat Hacker or Blackhat) is a computer hacker who usually violates laws or typical ethical standards. The term originates from the 1950s westerns, when bad guys typically wore black hats and good guys white hats. Black hat hackers aim to hack into any system for their own profit or out of malice. Black hat is contrasted with white hat. A third category is sometimes added, the gray hat, who hacks with good intentions but at times without permission. History The terms "Black hat" come from the color scheme used in westerns from the 1950s, in which the bad guys wore black hats, and the good guys wore white or other light colors. Criminals who intentionally enter computer networks are known as "black hat hackers". They may also distribute malware that steals passwords, credit card numbers, and other personal information, holds computers hostage, or destroys files. Even though hacking has become an important tool for governments to gather intelligence, Black Hats st ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




F-Secure
F-Secure Corporation is a global cyber security and privacy company, which has its headquarters in Helsinki, Finland. The company has offices in Denmark, Finland, France, Germany, India, Italy, Japan, Malaysia, Netherlands, Norway, Poland, Sweden, the United Kingdom and the United States, with a presence in more than 100 countries, and Security Lab operations in Helsinki and in Kuala Lumpur, Malaysia. F-Secure develops and sells antivirus, VPN, password management, and other consumer cyber security products and services for computers, mobile devices, smart TVs and internet of things devices. The company also offers several free-to-use tools on its website. History F-Secure was first established under the name Data Fellows by Petri Allas and Risto Siilasmaa on May 16, 1988. Data Fellows trained computer users and built customized databases. Three years later, the company launched its first major software project and developed the first heuristic scanner for antivirus products. F- ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Sophos
Sophos Group plc is a British based security software and hardware company. Sophos develops products for communication endpoint, encryption, network security, email security, mobile security and unified threat management. Sophos is primarily focused on providing security software to 1- to 5,000-seat organizations. While not a primary focus, Sophos also protects home users, through free and paid antivirus solutions (Sophos Home/Home Premium) intended to demonstrate product functionality. It was listed on the London Stock Exchange until it was acquired by Thoma Bravo in February 2020. History Sophos was founded by Jan Hruska and Peter Lammer and began producing its first antivirus and encryption products in 1985."Sophos: the early years"
''Naked Security''.
During the late 1980s and into the 1990s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Anti-virus
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other malware, antivirus software started to protect from other computer threats. In particular, modern antivirus software can protect users from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT), and botnet DDoS attacks. History 1949–1980 period (pre-antivirus days) Although the roots of the computer viru ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Russia
Russia (, , ), or the Russian Federation, is a List of transcontinental countries, transcontinental country spanning Eastern Europe and North Asia, Northern Asia. It is the List of countries and dependencies by area, largest country in the world, with its internationally recognised territory covering , and encompassing one-eighth of Earth's inhabitable landmass. Russia extends across Time in Russia, eleven time zones and shares Borders of Russia, land boundaries with fourteen countries, more than List of countries and territories by land borders, any other country but China. It is the List of countries and dependencies by population, world's ninth-most populous country and List of European countries by population, Europe's most populous country, with a population of 146 million people. The country's capital and List of cities and towns in Russia by population, largest city is Moscow, the List of European cities by population within city limits, largest city entirely within E ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]