Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 17 April 2013

The pen (or keyboard) is mightier then the malware!

Posted on 19:13 by Unknown
The title kinda says it all, doesn't it? I say it because... well, because it's true, really.

If you are a loyal reader of my blog, you will no doubt have noticed that malware can spread quickly across the internet. This is because they have the methods to do it that are hard to stop: Social Media, Email, Chat Programs, etc. This technology moves fast, so the malware moves as fast as the technology does. With one post on a social media website that grabs passwords and sends itself along, someone could infect the entire web.

Sounds like we are at a disadvantage, right? In a way, we are. Because most of the time, malware is set to automatically do this stuff right after it infects a computer. But we can turn the tables: We can use the very same technology that they use against them. We can spread news that there is a new piece of malware that users should be on the lookout for. We can spread the info on how to avoid getting infected. We can spread the news of anything really at a speed that almost matches that of the malware. If users know ahead of time, they can know not to click on something that they now know is infected or is malware in and of itself, effectively stopping the malware process of infecting and spreading.

Unfortunately, this is something that can only be done if we get enough people to share the info with others from the start. If we can, that means that friends that share the info with friends will get some of their friends interested. And those friends in turn will spread the info along to their friends. Then those friends will spread it on, and so on, and so on, and... well you get the idea.

This is what I attempt to do by blogging. If the info gets out there before the malware really starts gearing up, we can keep the number of infected computers down to it's minimum. And because cybercriminals make money for every infection, this means that they make less money and can use less money to make more malware. This can start a downward spiral until the number of infected computers reaches where it should be: ZERO. This may seem like a lofty goal, but it can be done. It must be done, because I doubt that anyone who has found themselves the victim of malware wants to live in a world where it cannot be stopped. And once it is stopped, people like me will no longer have a reason to continue telling others.

Feel free to comment if you have any questions or you just want to say something.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ▼  April (15)
      • Those silly scammers.
      • Is there such a thing is being too secure?
      • Passwords: Too Tough to Crack: Step 5 and The Wrap...
      • Passwords: Too Tough to Crack: Part 2
      • Shameless Plug: I talk about my new YouTube video.
      • Passwords: Too Tough to Crack: Part 1
      • Java: No more coffee for you.
      • The pen (or keyboard) is mightier then the malware!
      • Why events that get massive media coverage are a b...
      • URGENT Warning: Do not install MS13-036
      • My list of the top 3 free pieces of software.
      • What does it mean: Sandbox
      • Using Windows XP? Here comes the end.
      • What Does It Mean: Firewall
      • Haters Gotta Hate, Noobs Gotta Imitate.
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile