COMPUTER VIRUSES
Computer Viruses - Learn more about the threats to your PC in our comprehensive special report.
Any computer connected to the internet faces a daunting range of electronic threats. Perhaps the biggest single threat to any computer is the humble software bug. Seemingly innocuous programming errors can be exploited to force entry into a computer and also provide the weak spots that allow computer worms and viruses to proliferate.
Many software bugs will simply cause a computer to crash. But an expert programmer can sometimes figure out how to make a computer malfunction in a creative way, so that it provides access to secure parts of a system, or shares protected data.
When a software vulnerability is revealed, it is often a race against the clock to apply the correct software patch before an attacker can convert the bug into an "exploit" that can be used to cause major damage.
Viruses and worms
A computer virus is a program that spreads between computers by hiding itself within a - seemingly innocent - document or application. A worm, on the other hand, is a program that replicates and travels without "infecting" anything else on a system.
Many modern specimens of malevolent code, however, use a mixture of tricks to cheat their way onto computer systems, blurring the line between worms and viruses. The terms are now often used interchangeably.
The first worms appeared in the 1970s and spread slowly between computers connected to the same network. They simply displayed an annoying message on the screen of each infected machine. The first computer virus, called Elk Cloner, was written in 1982 and infected computers via floppy disks.
Trojans and zombies
But viruses and worms no longer just provide a way for malevolent hackers to gain notoriety. Today's viral code can contaminate computers at lightning speed, spreading via email, peer-to-peer file-sharing networks and even instant messaging programs. The most successful ones cause serious damage, forcing companies around the globe to close down while infected computers are cleaned up.
A string of recent specimens have been designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines. These programs are known as trojan horses.
There is evidence that virus writers can earn large amounts of money by leasing access to networks of compromised computers - often referred to as "botnets". These groups of remote-controlled "zombies" have been used to extort money from websites, by threatening to crash them with a denial-of-service (DoS) attack. This involves overloading a server with bogus page requests, so that real messages cannot get through.
Spam, Spam, Spam
Spammers have also begun using botnets to forward unsolicited bulk email advertising, or spam, through scores of zombie PCs. This makes it far more difficult for spam hunters to block the messages at source and catch the culprits.
Once considered a fairly minor problem, spam is rapidly spiralling out of control, and much more than half of all email messages are now thought to consist of unwanted advertising messages.
To combat computer scientists' best efforts to stem the tide of junk email, the spammers have had to become more cunning and sophisticated. More recently, spim (spam by instant messenger) and spit (spam by internet telephony) have joined the fray.
Phishing
Spam's more sinister cousin is the phishing email. This is a con trick that arrives as an email and tries to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password.
The simplest phishing tricks try to dupe a target into sending money as part of a get-rich-quick scheme. But phishing tricksters are also getting more devious and recent scams pose as customer service emails and send users to bogus banking or commercial websites where they are invited to "re-enter" their account information.
Some genuine sites have even proven vulnerable to software glitches that can be exploited to capture information from regular users. Phishing is especially threatening because it can be used to steal a person's digital identity.
Spyware
Along with spam and phishing, spyware represents the third of an unhappy trinity of internet pests. These insidious and clandestine programs typically find their way onto a computer system alongside another, often free, software application, although some can also exploit software bugs to get onto a machine. The programs are used to serve up unwanted adverts, change system settings and gather information on a user's online behaviour for marketing purposes.
Hackers
The term "computer hacker" was first coined in the 1960s and originally meant someone capable of developing an ingenious solution to a programming problem. But the phrase has since fallen into disrepute, entering the popular vocabulary as a term for a programmer with criminal intent.
The earliest "criminal" hackers were in fact relatively harmless, interested in testing the boundaries of their knowledge and their ability to get around security measures. They mainly performed innocuous pranks, for example employing low-tech tricks to get free calls through the US phone networks.
There are many tools in the modern hacking kit, including network scanners, packet sniffers, rootkits and decompilers. But "social engineering" - for example, putting a particularly enticing message in an email header to encourage people to open it - and even search engines can also be useful weapons for the hacker.
Computer crime
As the number of computers networks has grown, so have the possibilities for more serious misuse. And, as money increasingly becomes a digital commodity, the world has seen the emergence of serious computer criminals.
Criminal gangs have also started to get in on the action, attracted by the huge quantities of money now spent online every day. There is evidence that unscrupulous experts can also earn serious money from crime syndicates by breaking into computer systems, writing viruses and creating phishing scams.
And it is not just ordinary desktop computers that are under threat. Governments, banks and critical infrastructure can also be brought to a standstill by an expert armed only with a laptop computer and a net connection.
Mobile menace
The biggest new target for computer hackers is the mobile device. Virus writers are already experimenting with code designed for smartphones and experts predict more may be on the way, while hackers are also looking at ways to crack handheld devices.
While the internet has transformed global communication beyond recognition, the arms race between those intent on harnessing its power for criminal purposes and those tasked with preventing them has only just begun.
Articles
Watching virus behaviour could keep PCs healthy
Observing computer viruses in a closed environment and recording their "fingerprints" could make it easier for software to identify them – even if they are unknown variantsBreaking News - 15 June 2007Trade in software bugs plays into hackers' hands
The secretive trade in software security holes could encourage "bug hunters" to sell to hackersTechnology - 13 June 2007FBI data open to 'insider attacks'
The US's leading law-enforcement agency is failing to use simple security procedures - like passwords - to protect data from malicious insidersTechnology - 04 June 2007Virtual outbreaks, real world ramifications
The "Blood Plague" was supposed to be a bit of fun, before it escaped its caves and the virtual body count soared - what if it were a real epidemic?Features - 24 February 2007Major attack hits internet's 'root' servers
The blitz used infected "zombie" computers to bombard some of the central domain name system servers that keep internet traffic flowingBreaking News - 07 February 2007Experts warn of browser 'tab-jacking'
A new nuisance may soon begin stalking internet users, security experts warnBreaking News - 11 January 2007Spam choking the internet again
The latest spam figures confirm what many internet users already suspect –spam is increasing as senders find new ways to avoid filtering systemsBreaking News - 07 December 2006Microsoft woos users with latest Windows software
The company hopes Vista's improved security will attract businesses users – but Microsoft's dominance faces a new threat from online-only applicationsBreaking News - 01 December 2006Inboxes drowning in 'image spam'
Computer security experts are struggling to cope with a new type of spam sweeping the internetBreaking News - 17 November 2006ISPs 'should be responsible' for hacker attacks
A leading internet lawyer argues internet service providers should be legally liable for the damage caused by so-called 'denial of service' attacksBreaking News - 09 November 2006One in 10 snared by fake 'phishing' messages
More people than previously thought may be lured into handing over sensitive personal information by fraudulent "phishing" emailsBreaking News - 20 October 2006Apple blames iPod virus on Windows
Apple admits that a small proportion of Video iPods sold recently were infected with a computer virus, but blames software made by rival MicrosoftBreaking News - 18 October 2006Zombies breathe new life into spam
Bogus sales pitches hawking cosmetic enhancements and get-rich-quick schemes may no longer be confined to bulk emails sent by spammersTechnology - 27 July 2006The boss is watching your every click...
Want your online activity and blogs watched 24/7 by people armed with spying software? Get a job...Technology - 30 September 2006Instant messaging worm builds menacing 'botnet'
The worm disguises malicious code as a jpeg picture file attached to an instant message – it has ensnared thousands of computers so farBreaking News - 20 September 2006Introverted IT students more inclined to cyber-crime
The result might seem unsurprising, given the stereotypical image of computer geeks as socially inadequate, but the study contradicts earlier workBreaking News - 26 July 2006US loses momentum in spam battle
A survey of international sources of spam shows that US still leads the world in spewing out junk emailBreaking News - 25 July 2006Crime pays for 'stock spammers'
Plenty of people are falling prey to spammers who promote certain stocks in their bulk email shots - and it's raising the stocks' valueBreaking News - 15 July 2006Unnatural selection in the cyber world
The world's armies of identical computer systems are doomed - only those able to evolve into new breeds will surviveFeatures - 22 July 2006Pentagon fears enemies may sabotage chips
The US Department of Defense is looking at ways to check weapons system microchips from foreign suppliers in case of subtle tamperingTechnology - 27 June 2006Crime pays for 'stock spammers'
Plenty of people are falling prey to spammers who promote certain stocks in their bulk email shots - and it's raising the stocks' valueTechnology - 15 July 2006'Mashup' websites are a hacker's dream come true
Privacy and security go out the window when websites are merged to make them more usefulTechnology - 12 May 2006Spyware program 'blackmails' computer users
The program installs spyware on a computer and then blackmails users into buying software to remove itBreaking News - 31 May 2006How our body's defences aid computers in distress
The human immune system has inspired a new way of protecting computer networks from viruses and hackersTechnology - 19 May 2006Phishers could start using the personal touch
Imagine hackers being able to discover which websites you visit and using this info to personalise their bogus emails to youTechnology - 26 May 2006Computer chip fraud scandalises China
Experts say the controversy highlights the pressure on Chinese researchers to help their country catch up with the WestBreaking News - 15 May 2006US 'botmaster' jailed for hijacking 400,000 PCs
The hacker has been jailed for almost 5 years after using the network of 'bots' to send out spam, display pop-up ads and attack internet sitesBreaking News - 09 May 2006'Personalised' spam could slip past filters
Advertising emails that imitate a friend or colleague's writing style could be much harder to filter out, warn experts who have modelled the techniqueBreaking News - 27 April 2006Beat cybercrime, switch to a virtual wallet
You might never have to type in your card details again - virtual ID cards on your computer could make online transactions simpler, faster and saferTechnology - 31 March 2006Why timing is crucial in the botnet wars
Unlike their biological counterparts, computer worms don't come out at night, and taking this into account could help computer security firmsTechnology - 04 March 2006Cute graphics add credibility to fake websites
The fraudsters behind "phishing" attacks are using visual tricks to foster trust in their bogus websitesTechnology - 18 February 2006Has chatbot Alice crossed to the dark side?
Fears are growing that a clone of the open source chatbot Alice is duping users of MSN Instant Messenger into downloading spywareTechnology - 11 March 2006Risky websites get a billion visits a month
Five per cent of all net traffic is linked to sites that upload malicious software, deliver spam or try to collect sensitive data – but a new browser tool could helpBreaking News - 06 March 2006Worms nibble at Apple computers
The first few malicious programs aimed at Apple computers pose little threat, experts say, but will remind users that no platform is immune from attackBreaking News - 22 February 2006Turning the worm secures the computer
Worms, the enemy of PC owners and IT teams everywhere, are about to become a force for good, patching machines before bad worms can attackTechnology - 07 February 2006Computer virus fells Russian stock exchange
As the world waited for one computer virus to strike on Friday, another wriggled its way into the Russian stock exchange and knocked it offlineBreaking News - 03 February 2006'Zombie master' pleads guilty to PC hijacking
The US hacker invaded over 400,000 PCs, using them to attack commercial websites and flood the internet with spam emails and pop-up adsBreaking News - 24 January 2006Viral cure could 'immunise' the internet
A fix for computer viruses that itself spreads in viral way could vaccinate the internet, even against pests that travel at lightning speedBreaking News - 01 December 2005Critical bug found in anti-virus software
A serious software flaw that affects several of the most widely used anti-virus programs could be exploited to hijack machinesBreaking News - 22 December 2005Hackers change tactics to crack open computers
Cyber-criminals are shifting their attention from operating systems to specific software programs, including media players and even anti-virus softwareBreaking News - 22 November 2005Malicious software turns PSP into a 'brick'
The popular PlayStation Portable is the latest target for hackers, with the discovery of a "Trojan horse" program that renders the machine uselessBreaking News - 07 October 2005Let chaos keep your secrets safe
New cryptographic techniques could be good news for everyone except spies and gossip-seeking, phone call-intercepting journalistsFeatures - 19 November 2005Images could turn nasty with Windows bug
Microsoft releases software patches for a flaw that could allow seemingly harmless image files to crack open PCs for hackersBreaking News - 09 November 2005Police deactivate network of 100,000 'zombie' PCs
Three men are arrested in the Netherlands on suspicion of using a vast computer network for extortion and identity theftBreaking News - 12 October 2005Computer characters mugged in virtual crime spree
A man is arrested in Japan on suspicion of using software bots to beat up and rob game characters before selling their virtual possessions for real cashBreaking News - 18 August 2005Computer networks more vulnerable than ever
Software vulnerabilities that open computers up to malicious attacks reach record levels, while hacking tools become ever more sophisticatedBreaking News - 19 September 2005Net worms could wriggle around warning systems
The sensor networks that warn of an imminent outbreak could be dodged by craftier internet worms, researchers sayBreaking News - 05 August 2005Revealed: the true cost of computer crime
Attacks on computers and websites are increasing, but who exactly picks up the bill - and for how much?Breaking News - 25 June 2005Computer viruses become hacker informants
Virus writers have a dastardly new trick up their sleeves - programs that scan a network for vulnerabilities and report backBreaking News - 09 June 2005Triple virus wears down computer defences
Three viruses deliver a triple whammy to vulnerable machines and are designed to create a vast network of "zombies"Breaking News - 06 June 2005New hack cracks 'secure' Bluetooth devices
The trick, partly demonstrated in real gadgets, works by spoofing a device’s identity and pretending to have forgotten a cryptographic keyBreaking News - 03 June 2005'Patient zero' pinpointed in PC-worm outbreak
A new technique could help law enforcers identify those responsible for distributing viral code across the internet, researchers sayBreaking News - 27 May 2005'Honey monkeys' deployed to catch crooked code
In an effort to pre-empt computer hackers, Microsoft is developing virtual PCs to scour the web for previously undetected attack codeBreaking News - 19 May 2005Instant messaging falls prey to worms
Hackers are increasingly turning to stealthier ways of spreading malicious software - their latest target is instant messagingTechnology - 14 May 2005
Teamwork will beat the spammers
More than two-thirds of all email traffic is spam, but the problem could be reduced if our computers work together to control itTechnology - 12 May 2005Google blackout linked to internet infrastructure
A brief outage at internet search giant Google draws attention to the creaking addressing system that underpins the worldwide webBreaking News - 09 May 2005Do not let a virus steal your songs

Cellphone giant Nokia may build antivirus software into its latest batch of multimedia smartphones, fearing the effects of new phone virusesTechnology - 07 May 2005Poisoned web poses risk to security
At first it was just a prank, but now hackers are corrupting the net for real and their bogus sites could fool us all - and cost us tooBreaking News - 23 April 2005Attack on game raises prospect of online extortion
The game Final Fantasy XI suffered disruption after being bombarded with bogus traffic from hundreds of remotely-controlled computersBreaking News - 21 April 2005Following the trail of the zombie PCs

First you have to lure them in, then trap them and study them - only then can they be eradicatedTechnology - 26 March 2005Microsoft competitors vulnerable to attack
The software giant's rivals are slammed as being more vulnerable to security breaches by an independent reportNews - 02 April 2005War of words over operating systems' safety
Doubts are cast over the security of major browser and operating systems formerly regarded as safe havens from hackers and virusesBreaking News - 23 March 2005Virus writers focus on Instant Messenger
Microsoft announces a product that makes messaging easier within its applications while experts warn that IM is the new target for hackersNews - 19 March 2005Attempted cyber-heist raises keylogging fears
Keystroke-logging software allegedly provided hackers with the passwords needed to attempt the theft of £229 million from a Japanese bankBreaking News - 18 March 2005Spies infiltrate zombie computer networks
Computers deliberately left open to online attack are being used to place spies in the hacker-controlled networks of infected machinesBreaking News - 16 March 2005Rush to VOIP raises security fears
A host of new internet telephony initiatives sparks a debate about how secure the systems are against hackersBreaking News - 14 March 2005Phone viruses: how bad is it?
Fears of a sudden epidemic are growing, but experts are split on the true size of the "malware" threatBreaking News - 06 March 2005Worms flood instant messaging networks
The worms turn computers into remote-controlled zombies and have sparked battles between rival virus-writing gangsBreaking News - 10 March 2005New cellphone virus rifles through phonebook
The first mobile phone virus capable of accessing saved numbers and using them to send a copy of itself to uninfected phones is discoveredBreaking News - 08 March 2005iPod 'squeaks' betray software secrets
The inner workings of the Apple's latest iPod have been deciphered by programmers using an ingenious acoustic trickBreaking News - 01 March 2005Anti-theft device shuts down PC monitors
The monitor turns off if the computer becomes disconnected from its office network for more than 10 minutes - until returned to the networkTechnology - 26 February 2005Computer vulnerabilities given unified rating system
The system should provide system administrators with the first quick way to prioritise the dozens of security alerts they receive each weekBreaking News - 21 February 2005'Spoofing' trick affects many web browsers
The attack exploits a feature used to display foreign characters and could aid "phishing" scams - programmers have rushed to plug the holeBreaking News - 09 February 2005Software bots could menace Google ads
Adverts bundled with Google search results can be sabotaged using a simple trick, warn computer security expertsBreaking News - 04 February 2005Wireless boom is hackers' heaven

Off-putting and complex security features mean that new Wi-Fi users are not bothering to protect their networksTechnology - 22 January 2005Spammers attack while looking legit
By using a new trick to route their junk emails through legitimate mail servers, spammers could make their missives much harder to blockTechnology - 12 February 2005New hybrid cellphone-virus discovered
Lasco.A spreads itself via Bluetooth but also wriggles into other files on an infected handset, which could make it more prolificBreaking News - 13 January 2005Microsoft browser bugs 'extremely critical'
The alert comes after code showing how to crack a computer using flaws in Microsoft's Internet Explorer was posted onlineBreaking News - 10 January 2005Anti-spammer attack scheme halted
A controversial service enabling frustrated computer users to attack sites associated with spam has been put on holdBreaking News - 03 December 2004Flaw in Google Desktop Search exposed data
A small browser program combined with the search tool allowed information to be captured from remote users - Google has now fixed the flawBreaking News - 21 December 2004Trojan program poses as anti-spam screensaver
Disguised as a computer screensaver aimed at cutting spammer's profits, the trojan "spyware" steals user passwords and email addressesBreaking News - 08 December 2004Spyware floods PCs from a single web page
A host of unwanted programs can infest an unprotected computer during a visit to a single web page, a study showsBreaking News - 25 November 2004Java bug could hit PC operating systems
A flaw found in the popular programming language, if exploited by hackers, could pave the way for a cross-platform computer wormBreaking News - 24 November 2004Trojan spammers take aim at mobile phones
Infected computers churn out cellphone spam messages, though only a handful of computers are infected so farBreaking News - 09 November 2004How zombie networks fuel cybercrime
So-called botnets, which can take down major websites or mount massive spam attacks, are being rented out by hackersBreaking News - 03 November 2004Worm targets Mac's latest operating system
Malicious code designed to attack Apple's OS X spooks Mac users, who have generally been ignored by virus writers till nowBreaking News - 26 October 2004Instant messenger could control hacked computers
The software robot allows a hacker to find vulnerable machines and mount attacks, but it could be used to protect networks tooBreaking News - 13 October 2004Move over spam, make way for "spit"
The rise of internet telephony could soon lead to unwanted voice mail messages clogging up phones, warns a technology companyBreaking News - 24 September 2004Thousands of zombie PCs created daily
Up to 75,000 computers are captured each day by virus writers who can sell them on to online extortionists and spammersBreaking News - 20 September 2004Software bug raises spectre of 'JPEG of death'
Ten years ago the idea of an image infecting a computer was so absurd it became a hoax - not anymore, say expertsBreaking News - 15 September 2004Computer worm 'sniffs' out passwords
The malevolent program eavesdrops on network traffic in an attempt to steal passwords and financial dataBreaking News - 14 September 2004Microsoft prepares largest ever software upgrade
Service Pack 2 fixes bugs and bolsters security in Windows XP - reflecting growing concern over software attacksBreaking News - 10 August 2004Handheld computer 'Trojan' discovered
The malicious program, dubbed Brador, could remotely take control of palmtop computers - prompting experts to warn against complacencyBreaking News - 06 August 2004Email harvesting virus crashes Google
MyDoom.o also slowed or stopped traffic on three other major search engines - Lycos, Yahoo and AltavistaBreaking News - 27 July 2004Handheld PC virus holds ominous promise
The first handheld PC virus is relatively harmless but could be a harbinger of more serious threats to comeBreaking News - 20 July 2004Let the PC entertain you

Computer companies want to oust the TV and the hi-fi from your living room. Will they succeed?Technology - 17 July 2004Always on, always under attack
One in three PCs is now infected with a virus, spyware or a covert diallerTechnology - 17 July 2004Claim of spyware on Beastie Boys CD denied
Suspicions that the new CD automatically installs sinister software is denied by the music company that released itBreaking News - 23 June 2004Major website blackout blamed on massive attack
Some of the world's most popular internet sites were knocked out after a co-ordinated and distributed attackBreaking News - 16 June 2004First cell phone worm emerges
A harmless virus which can jump between cell phones using Bluetooth has been created, stoking fears of more dangerous wormsBreaking News - 15 June 2004May saw peak of sinister computer viruses
More viruses were released than for several years - worse, the prevalence of highly destructive viruses is risingBreaking News - 04 June 2004Laying siege to the grid

The world's most powerful supercomputer networks are under attack. But given the enormous technical expertise this requires, why are the hackers bothering? David Cohen investigatesTechnology - 22 May 2004Pesky Netsky
Is the web a safer place after the capture on 7 May of "Sven J", an 18-year-old German student accused of creating the Sasser virus?News - 15 May 2004'Dabber' worm targets computers through Sasser
The computer worm is the first parasite of a parasite, and uses a software bug in the 'Sasser' worm to spreadBreaking News - 14 May 2004Chasing the elusive shadows of e-crime

How do you catch a criminal if the clues are deleted from their computer? In the virtual world there will always be faint digital fingerprints left behindTechnology - 08 May 2004Sasser is fastest written Windows worm
It was released just 17 days after Microsoft revealed the software flaw it exploits - but not revealing bugs would be worse, say expertsBreaking News - 05 May 2004Sasser computer worm wriggles worldwide
More than a million PCs may have been hit - even worse, a bogus software patch containing another virus is now spreading via emailBreaking News - 04 May 2004