Symantec AntiVirus Center
- McAfee / Network Associates
A leader in the anti-virus industry. Get the specifics of any known virus out there.
Information about viruses and how a specific virus may affect your computer. Also includes latest virus threats and security advisories.
An International publication on computer virus prevention, recognization, and removal. Virus Bulletin is the technical journal on developments in the field of computer viruses and anti-virus products.
- Kaspersky Labs
The leader in first response to virus outbreaks.
- Norman Data Defense
A leading company within the computer data security field. With products for virus control, personal firewall, encryption, risk analysis, data recovery, and certified data erasure. Also includes, latest virus warnings ranked by risk.
- Sophos Anti-Virus
Software specifically designed to protect networks from viruses. Also includes, latest virus alerts and virus information.
- Trend Micro
Software to protect your web server. Also includes, virus advisories, encyclopedia, and latest virus threats.
What's the difference bewteen a Virus and a Worm?
A virus is a computer program that attaches itself to
a computer system by incorporating a small portion of data into
other programs. Once triggered, usually by some action performed on the part of the computer
user such as clicking on a file, the virus lies
in wait for a command or certain date to deliver its payload, sometimes harmless and other times
devastating. Receiving or downloading files such as "AOL4FREE.exe" or free screen savers are more
likely to contain viruses than not. "Trust everyone, but brand your cattle!"
A worm is a sub-classification of a virus. A worm contains a small computer program that
can replicate itself, and like a worm, wiggles its way through a computer system or network until
it finds a way onto the Internet. Many worms have shut down corporate america for days at a time.
Microsoft, IBM, and other large businesses have had their e-mail systems literally collapse due to
the volume of incoming and outgoing e-mail that these worms generate. The computer
user is usually no more the wiser that anything is even happening, when in fact once the user
connects to the Internet, the worm goes into action e-mailing itself to the user's family, friends,
collegues and any other e-mail address it came across on the user's system or network.
Get more information on these popular computer threats:
- Messenger Spam
Learn how to block those annoying Messenger Service pop-up advertisements. This is a new breed of pop-up spam advertisements. Learn how they work and find a few quick and easy steps to adjust your computer's settings to block these annoying pop-ups forever.
- How a "Denial of Service" (DDoS) Attack Works
Learn more about the process that managed to take down such websites as Yahoo!, Amazon.com, e-Bay, Buy.com, and others by using an innocent computer or network without their owners even knowing about it. The army of "zombie" computers (in unison) send certain commands to a targeted website in an attempt to overload its server and ultimately causing a "denial of service" for all subsequent visitors to the website. From Gibson Research.
- Free System Check
Run a free check on your computer system to see if it's already a zombie or if it has the vulnerability to become one. From Gibson Research.
- Anna Kournikova Virus
Learn more about the Anna Kournikova worm that does more than play tennis with your computer. Ranked as high risk.
- Bagel Virus
Learn more about the Bagel worm that forages on your address book. Downgraded to a low risk.
- Brown Orifice Virus
- Bubbleboy Virus
Learn more about the Bubbleboy worm that marks the beginning of a high-tech computer virus war. Ranked as extreme high risk. From McAfee Online.
- Bugbear Virus
Learn more about the Bugbear worm that attempts to disable your anti-virus software and tries to replicate itself by sending e-mails to your family and friends using addresses found on your computer. Ranked a medium risk. From McAfee Online.
- Explore Virus
Learn more about the Explore Virus which was onced ranked as extreme high risk. From McAfee Online.
- Chernobyl Virus
Learn more about the Chernobyl anniversary virus (also known as the CIH and Network Nuke virus) which is set to strike on Monday, April 26th (the 13th anniversary of the Chernobyl nuclear disaster). From McAfee Online.
- Free Chernobyl Detect/Fix Program
From the AntiVirus Research Center.
- Goner Virus
Learn more about the Goner worm which is ranked as high risk. From McAfee Online.
- Klez Virus
Learn more about the Klez mass mailing worm and how to stop it from replicating itself by e-mailing users in your Windows Address Book. From McAfee Online.
- Lovsan aka Blaster Virus
Learn more about this Internet worm and how it exploits a vunerability in Microsoft Windows to enable itself without having to click on it or requiring any other action on the part of the user. LovSan has been given a "medium on watch" risk rating. From McAfee Online.
- Melissa Virus
Learn more about the Melissa virus, how to protect yourself, and how to detect if she is on your computer system. This virus managed to get its creator a 20 month prison sentence. From McAfee Online.
- Nimda Virus
Learn more about this mass mailing Internet worm. Its main goal is simply to spread over the Internet and Intranet, infecting as many users as possible and creating so much traffic that networks are virtually unusable.
- Pretty Park aka South Park Virus
Learn more about this Internet worm that is making a comeback and is being ranked as a high risk. From McAfee Online.
- Mydoom aka Novarg Virus
Learn more about the Mydoom worm. Its main goal is to infet as many computers as possible and on a given date have those computers launch a Denial of Service attack on a specific website. This worm is ranked as a high risk. From McAfee Online.
- Sasser Virus
Learn more about the Sasser worm. This worm, unlike many others, does NOT spread by e-mail. Rather, this worm works by instructing infected computers to stealthly download and execute the real virus payload. This particular worm requires no action by the user, who becomes infected by virtue of an unsecure computer that most likely lacks a firewall. Its creator, an 18 year old from Germany, has since been arrested. This worm is ranked as a medium risk. From McAfee Online.
- Sobig Virus
Learn more about this Internet worm and its mutations. The latest variant of Sobig has been given a "high risk" rating due to its recent modifications and its quick infection rate. From McAfee Online.
- Zotob Virus
Learn more about the Zotob worm that may allow someone to remotely take control of your computer. From McAfee Online.
See also, these cross-references: