SlideShare uma empresa Scribd logo
1 de 17
A Malware are forms of disturbing and intrusive software. This usually
includes viruses, spyware, and scareware, but this are just a small part of the many
hostile software. This Malwares can show their self in different ways; usually as codes,
scripts, or an active content (Weather maps, animated images, streaming video and
audio…) that might look innocent but might damage your electronic devices.
Technology is completely evolved and changed that is now possible to create
your own malware by using specific, but illegal, applications.
Vocabulary
Application: a self-contained
program or piece of software
designed to fulfill a particular
purpose(Wikipedia)
Many nations have agreed to find a solution for these malwares, the problem
is that no country, excluded for the U.S, has precise laws about this hostile systems.
“…Many nations would not much like the idea of several centuries of imprisonment for a
precocious sixteen year old who wrote a little bit of code in his free time. Even worse is the idea
of corporal or capital punishment. Many nations that have extradition treaties with the United
States refuse to turn over criminals to US law enforcement when their crimes are punishable by
death under US law…” (TechRepublic)
Most of the time this systems are created to steal, use, publish other’s information,
data, this can be consider illegal, unless if given consent by a legal.
1983:Virus was defined
1986: Virus disables internet
1998: First virus on Microsoft
Anyone can be able to create malwares, commonly are high school students
that for fun get to systems and modify them.
A common name to describe them is ‘Hacker’, but it’s not correct to use this
terminology without knowing the meaning.
“In computing, a hacker is any highly skilled computer expert capable of
breaking into computer systems and networks using bugs and exploits.
Depending on the field of computing it has slightly different meanings, and in
some contexts has controversial moral and ethical connotations.”(Wikipedia)
"Malicious, in criminal proceedings and in the legal world, has very direct implications,
and a reasonable person or society would not interpret the actions taken by a law
enforcement officers pursuant to a court order to be malicious.“(FBI)
There are several events where malwares were used in an ethical way.
There are several anti-malwares on the internet, but only a small part of them is reliable,
the most known are BitDefender, Panda Antivirus, and Malware bytes. This anti malware
shave a precise method to do their job. Many programs scan for malware using a database
of known malware definitions (also called signatures). These definitions tell what the
malware does and how to recognize it. If the anti-malware program detects a file that
matches the definition, it’ll flag it as potential malware. This is a good way to remove
known threats, but it does require regular updates to make sure the program doesn’t miss
out on newly developed malware.(from Malwarebytes)
Technologically speaking malwares are hidden in sequences of codes and most
of the time signaled as ‘virus’, but with the help of anti-malwares it’s easier to
extract and find a malware.
Hacker have already breached Internet-connected camera
systems, smart TVs, and even baby monitors.
Molly Wood, The New York Times
It is easy to find news about hackers that have been circulating on the internet for
years, but we never know what this individuals have done.
 Gary McKinnon, is a Scottish Hacker that has been accused of “the biggest
military computer hack of all time.”
 Anonymous is a group of different avatar hackers accused of Homophobia and
decriminalization.
 LulzSecurity is a group of hackers accused of high profile attacks.
 Kevin Mitnick is an American Hacker that was accused in 1995 of high level
hacking, and later of communications-related crimes.
Gary McKinnon Anonymous LuzlSecurity Kevin Mitnick
A thief is a thief , whether he steals a diamond or
cucumber.
Indian Proverb
The first Malwares were trading systems between armies and secret agencies, but now
days Malwares are programmer’s experiments, or annoying prank that most of the time end up by
acting illegal, or morally unacceptable.
It is right to know what are the morals of the internet and how we can correctly use it
without interfering with other's life.
This Malwares might ruin or destroy valuable resources that give us technical support, that
is costly and take time. We can describe this actions as vandalism or carelessness for other
people’s work and material.
This systems violate the two main ‘laws’ of the internet; Copyright and Privacy.
They copy or steal all your data, which can be a paper work, a contract, or pictures of
yourself, and might sell them in exchange of passwords, money, or codes for future acts.
People suffers everyday from this kind of vandalism, looses job, family, and sometimes all
their money this was severely discussed by politicians who are looking for a solution.
“We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time
to worry about a new kind of WMDs – Weapons of Mass Disruption; Malwares.”
John Mariotti
“Our privacy is being attacked on multiple fronts.”
Tim Cook
“People’s computers are not getting more secure. They’re getting more infected with
viruses. They’re getting more under the control of Malwares.”
Avi Rubin
“I always tell people that if you haven’t had your identity stolen already, you will.”
Mike Sullivan, Take Charge America
Thanks for watching!

Mais conteúdo relacionado

Mais procurados

computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threatsEC-Council
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you thinkNathan Winters
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?AariyaRathi
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 

Mais procurados (20)

computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Virus
VirusVirus
Virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
spyware
spywarespyware
spyware
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Spyware
SpywareSpyware
Spyware
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Ppt123
Ppt123Ppt123
Ppt123
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Semelhante a Malwares

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaGeorge Braga
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker PlagueLuke Perrin
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 

Semelhante a Malwares (20)

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Malwares

  • 1.
  • 2. A Malware are forms of disturbing and intrusive software. This usually includes viruses, spyware, and scareware, but this are just a small part of the many hostile software. This Malwares can show their self in different ways; usually as codes, scripts, or an active content (Weather maps, animated images, streaming video and audio…) that might look innocent but might damage your electronic devices. Technology is completely evolved and changed that is now possible to create your own malware by using specific, but illegal, applications. Vocabulary Application: a self-contained program or piece of software designed to fulfill a particular purpose(Wikipedia)
  • 3. Many nations have agreed to find a solution for these malwares, the problem is that no country, excluded for the U.S, has precise laws about this hostile systems. “…Many nations would not much like the idea of several centuries of imprisonment for a precocious sixteen year old who wrote a little bit of code in his free time. Even worse is the idea of corporal or capital punishment. Many nations that have extradition treaties with the United States refuse to turn over criminals to US law enforcement when their crimes are punishable by death under US law…” (TechRepublic) Most of the time this systems are created to steal, use, publish other’s information, data, this can be consider illegal, unless if given consent by a legal.
  • 4. 1983:Virus was defined 1986: Virus disables internet 1998: First virus on Microsoft
  • 5.
  • 6.
  • 7. Anyone can be able to create malwares, commonly are high school students that for fun get to systems and modify them. A common name to describe them is ‘Hacker’, but it’s not correct to use this terminology without knowing the meaning. “In computing, a hacker is any highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploits. Depending on the field of computing it has slightly different meanings, and in some contexts has controversial moral and ethical connotations.”(Wikipedia)
  • 8. "Malicious, in criminal proceedings and in the legal world, has very direct implications, and a reasonable person or society would not interpret the actions taken by a law enforcement officers pursuant to a court order to be malicious.“(FBI) There are several events where malwares were used in an ethical way.
  • 9.
  • 10. There are several anti-malwares on the internet, but only a small part of them is reliable, the most known are BitDefender, Panda Antivirus, and Malware bytes. This anti malware shave a precise method to do their job. Many programs scan for malware using a database of known malware definitions (also called signatures). These definitions tell what the malware does and how to recognize it. If the anti-malware program detects a file that matches the definition, it’ll flag it as potential malware. This is a good way to remove known threats, but it does require regular updates to make sure the program doesn’t miss out on newly developed malware.(from Malwarebytes)
  • 11. Technologically speaking malwares are hidden in sequences of codes and most of the time signaled as ‘virus’, but with the help of anti-malwares it’s easier to extract and find a malware.
  • 12. Hacker have already breached Internet-connected camera systems, smart TVs, and even baby monitors. Molly Wood, The New York Times
  • 13. It is easy to find news about hackers that have been circulating on the internet for years, but we never know what this individuals have done.  Gary McKinnon, is a Scottish Hacker that has been accused of “the biggest military computer hack of all time.”  Anonymous is a group of different avatar hackers accused of Homophobia and decriminalization.  LulzSecurity is a group of hackers accused of high profile attacks.  Kevin Mitnick is an American Hacker that was accused in 1995 of high level hacking, and later of communications-related crimes. Gary McKinnon Anonymous LuzlSecurity Kevin Mitnick
  • 14. A thief is a thief , whether he steals a diamond or cucumber. Indian Proverb
  • 15. The first Malwares were trading systems between armies and secret agencies, but now days Malwares are programmer’s experiments, or annoying prank that most of the time end up by acting illegal, or morally unacceptable. It is right to know what are the morals of the internet and how we can correctly use it without interfering with other's life. This Malwares might ruin or destroy valuable resources that give us technical support, that is costly and take time. We can describe this actions as vandalism or carelessness for other people’s work and material. This systems violate the two main ‘laws’ of the internet; Copyright and Privacy. They copy or steal all your data, which can be a paper work, a contract, or pictures of yourself, and might sell them in exchange of passwords, money, or codes for future acts. People suffers everyday from this kind of vandalism, looses job, family, and sometimes all their money this was severely discussed by politicians who are looking for a solution.
  • 16. “We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time to worry about a new kind of WMDs – Weapons of Mass Disruption; Malwares.” John Mariotti “Our privacy is being attacked on multiple fronts.” Tim Cook “People’s computers are not getting more secure. They’re getting more infected with viruses. They’re getting more under the control of Malwares.” Avi Rubin “I always tell people that if you haven’t had your identity stolen already, you will.” Mike Sullivan, Take Charge America