Since its official debut on the market, nearly a year ago, Windows 10 has become the main discussion topic of the entire computer business. Many reported Microsoft’s inclination to cause troubles or even real damages to users with the company’s new policy about cloud computing, mandatory updates and free offers you cannot refuse, but for me Windows 10 suffers from a fundamental issue that’s even more difficult to ignore. The entire “Windows as a service” concept is utter nonsense, and if Microsoft has taken this path I don’t think I will be able to follow it.
Among the many lies cloud computing providers tell users and companies, the one about reliability and full-time availability is always the first to be proven wrong by facts. Cloud platforms go off-line almost regularly, and it matters little that the infrastructure is needed to manage applications and data in real time or that the affected provider is a hi-tech giant. Sooner or later all the remote servers vanish in a sorrowful cloud, and the user is left with his frustration for having entrusted his own business or digital life to someone who is only interested in turning them into profits.
Before the arrival of Windows 95, the creators of self-replicating malicious code were deeply concerned about the potential consequences of the new OS on the future of their activity. After the historical generation leap from DOS to the windows-based GUI, however, virus writers gained new confidence in their abilities, expanding their horizons and developing inclinations that occasionally turned into true megalomania. Some of the VXers from the Nineties had the god complex, and they didn’t hide it at all.
In April 1994 computing was still young, operating systems worked from the command line and the PC still had to become the universal phenomenon which later turned into a commodity like everything else. Microsoft was about to radically change things by releasing Windows 95, but there was another group of technophiles concerned with the generation leap from the prompt to the windows-based GUI and the consequences that it would have had on how the low-level code ran.
Trend Micro recently discovered a new malware family, classified as PE_VIRLOCK and designed as a combination of two different types of malicious code. The first type is related to a past when we still talked about computer “viruses” and not cyber-crime, while the second one is one of the most successful malware-based businesses of the past years. VIRLOCK is a ransomware which is capable of spreading through file virus techniques, and the worst part is that its evolution isn’t complete yet.
One March many years ago, when the IT industry was rather different compared to the modern one, two computer viruses brought panic because of an out-of-scale media attention. Born out of a time when the “malware” (an unknown term then) creators were largely interested in fame more than money, the viruses ended up making substantial damages valued (in one of the two cases) more than 1 billion dollars.
In an age where malicious code has turned into cyber-crime and ransomware is asking for lot of money to unlock the access to user’s files, a particular class of malware with ancient origins is still able to survive – even though it’s forced to serve the needs of the aforementioned crime. The class I am talking about is the virus or file virus one, a type of digital pathogen that raged in the MS-DOS times and then began to slowly wane when Windows appeared and Internet worms brought their worldwide epidemics.
The CryptoLocker ransomware is still raging on-line and on users and companies computers, while new details about the source of this dangerous file-abducting trojan propagation come out and willing developers are trying to hinder the infection spreading. The criminal gang which created the malware even comes up with new ways to take money from users affected by the threat, even though in doing so it is forced to contradict itself.
A new ransomware for Windows PCs is roaming on-line, it’s called CryptoLocker and brings a very dangerous destructive potential. Security enterprise Sophos warns – via Naked Security – users and system admins about the new threat, its features and the fact that the “prevention is better than a cure” rule is true now more than ever. Curing the damages of a CryptoLocker infection, Sophos warns, is impossible for the time being.
Symantec recently detected a computer threat belonging to the ransomware category, a malware that is dangerous because of the way it attacks PCs based on Windows operating systems even though it isn’t particularly complex to defeat. Trojan.Ransomlock.AF, as the malware is named, targets users of the Chinese Internet with an account on Tencent QQ (or “QQ”), an instant messaging service that is very popular within the Asian country.