Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
No Result
View All Result
Home Technology Computer Science

Computer Virus: A 20-Year Retrospective

by Sci
March 20, 2006
in Computer Science
0
Share on FacebookShare on Twitter

In the 30 years of computer development, there has been a silent presence for twenty years: computer viruses. Humanity has invested significant effort into advancing computer science and equally into eliminating viruses. Like a chronic disease, computer viruses show no signs of abating. They continue to evolve with increasing scale and harm.

virus 2What solutions exist for computer viruses? A seemingly simple question yet still without a satisfactory answer. Let us turn back the timeline, analyze, and reflect to find solutions to this “century-spanning” problem.

Computer Viruses: A Persistent Joke

In fact, computer viruses have existed since the early 1970s. The Creeper (1970), Rabbit (1974), and Animal (1980) viruses are considered the ancestors of computer viruses. However, since they were born on mainframe computers, they only circulated within laboratories, largely unnoticed outside of computer science experts. Computer viruses only began to impact society significantly when they transitioned from mainframe computers to personal computers. Brain was the first computer virus (1986) to accomplish this task. The initial purpose of Brain was to serve as an advertisement for Brain Computer Service in Lahore, Pakistan. When a computer became infected, a screen would unexpectedly appear displaying the name, address, and even contact number of the company! Parasitizing the boot sector of the 360KB floppy disk, the most common data exchange storage medium at that time, the Brain virus spread globally. Although it caused no harm to computers, Brain instilled fear in many users.

Following Brain, other boot-sector viruses (B-viruses) appeared, such as Lehigh, Vienna, Cascade, and Pingpong… Viruses of this period were all “benign,” mostly originating from universities with many talented, energetic, and playful students. However, their harmlessness did not last long. To make a strong impression, hackers deliberately inserted malicious code into B-viruses, making them more aggressive. A representative of this type is the Disk Killer virus. After 30 hours of infection, this virus would encrypt the data that locates disk partitions, crippling the system while destroying all data.

Because it attacked computers before the operating system booted, even though small in size (512-2048 bytes), B-viruses could easily control disk access tasks at the BIOS level, independent of the operating system. The main disadvantage of B-viruses was their low activation rate (since not all computers booted from floppy disks). To combat B-viruses, ROM-BIOS manufacturers took timely action: they provided the option to disable the ability to boot from floppy disks. Some chip manufacturers even integrated procedures to recognize B-virus-like behaviors into ROM-BIOS.

In light of this situation, hackers strived to expand the target of infection to COM and EXE executable files of the operating system, giving rise to a new type of virus: file viruses (F-viruses). Although dependent on the operating system, F-viruses addressed the basic shortcomings of B-viruses. Utilizing the operating system’s scripts, F-viruses not only disabled programs that recognized virus-like behavior in ROM but also enhanced their ability to create multiple parasitic copies on other objects within the system. Vietnamese people in the 1990s still remember the impressive attacks of viruses like Friday 13th, Datalock, Little Girl, and White Rose on the MS-DOS operating system, which had a simple structure with numerous serious security vulnerabilities.

However, the worst was just beginning. Along with F-viruses, hybrid viruses (which infect both boot sectors and executable files) such as BFD, Compback, Invader, Junkie, and Natas wreaked havoc on both ROM-BIOS and operating systems. Disk structure viruses like Dir2/FAT and Weichan also joined the fray, complicating the situation further.

Recognizing the weaknesses of 16-bit products, Microsoft decided to cease development of MS-DOS and Windows 3.x. In 1995, the company launched the 32-bit graphical interface operating system. The release of Windows 95 marked a significant shift in the global information technology landscape and also shook the world of computer viruses. While MS-DOS applications ran in real mode during individual sessions, Windows 95 applications operated in protected mode under a multitasking model. Each process was assigned a separate space by Windows, completely isolated from other applications. This model disrupted the design techniques of F-viruses employed by hackers. In a single-task environment, from its own resident memory area, the F-virus could freely interfere with the space of other applications. In a multitasking environment, the F-virus could only operate within the virtual machine space of the application that contained it. Nevertheless, some F-viruses on Windows (like Spenna Spy, Bodgy, Bolzano, Pate…) attempted to exploit directory search functions to inject code into “dormant” files on the disk system. This approach only temporarily improved the situation as the viruses were easily detected (the hard disk was accessed continuously, suspicious disk space increase, significant slowdown of the machine…).

Perhaps the creators of computer viruses understand very well the meaning of the proverb “necessity is the mother of invention.” Concept is one such virus. By exploiting the macro code (VB Application) in the Microsoft Office suite, the author of this virus created a new type of virus solely to “prove my point,” demonstrating that viruses could also infect data files! Although it caused no destruction, the worst thing this hacker did was publish the entire code of the virus. This ignited the “post-Concept” phase with the emergence of macro viruses like CAP, Gold Fish, CyberHack, and JohnMMX. Not stopping there, macro viruses also “invaded” Microsoft Excel with lasting “products” like Laroux, HalfCross, and After-5h… Even PowerPoint presentation files were infected by the TriState virus.

Not content with the VBA code, hackers researched and developed other destructive propagation methods. A variety of malware such as worms, trojan horses, and backdoors emerged one after another. Not directly infecting executable files like F-viruses, they existed and operated as standalone applications. Taking advantage of network communication, they self-replicated to addresses collected from intermediate stations along the transmission path. DemiURG, a virus dubbed “7-in-1,” is a prime example. Spreading over the network to the target machine, DemiURG dispersed into 7 infection types: BAT, EXE-DOS, EXE-16, EXE-32, DLL, XLS, and VBS. When one type discovered a “prey,” it summoned its 7 siblings to infect the target. If any type was eliminated, the others would assist the fallen.

In this situation, Microsoft reluctantly added the “Warning virus macro” feature in MsOffice 97. This move reduced the number of macro viruses but also caused the giant to sweat profusely due to diminished reputation: customers were no longer enthusiastic about the VBA script, which had previously been advertised as a powerful customization tool for advanced users.

Recognizing the growing significance of the Internet, Microsoft introduced Windows 98 in 1998, adding numerous important network services. The Windows 98 and MSOffice 97 products effectively fulfilled their roles in collaborative and shared environments. However, the cloud of viruses did not truly dissipate. Although appearing superior to MS-DOS in terms of security, Windows 9x also had its vulnerabilities. CIH (also known as Chernobyl) is a testament to the looseness of this operating system. CIH was discovered in July 1998 in Southeast Asia. Its creator believed the virus’s destructive potential resembled the disasters of the Chernobyl nuclear reactor leak in Russia on April 26, 1986, which humanity must remain vigilant about. CIH variants infected Windows 9x EXE-32 files. Every time it activated, CIH checked the system’s current date to decide whether to “strike” or merely infect other EXE files. If it was the correct date of April 26 (for variants 1003 and 1049) or the 26th of any month (for variant 1019), CIH would format track 0 of all hard drives on the machine, then write “garbage” into the flash ROM, causing the machine to be completely destroyed. Exploiting the weaknesses of Windows 95, CIH changed users’ subjective perceptions that “computer viruses only destroy logical data; they cannot touch the hardware.” With its nefarious script, CIH damaged millions of “branded” computers worldwide (those using ROM chips soldered onto the motherboard).

While Microsoft had yet to “recover” from the blow of CIH, the pesky macro viruses reemerged. In March 1999, Melissa (a relative of VicodinES) made a spectacular appearance. Using only VBA scripts, Melissa became the first macro virus capable of sending its code to email addresses in the victim’s address book. Thanks to email services, Melissa infected hundreds of thousands of computers within hours, an impressive infection rate hackers longed for. In turn, Melissa set an example for other viruses like Sircam and Nimda to follow. However, these scripts differed from Melissa’s. Once they seized control of the system, they brazenly rummaged through the My Documents folder for users’ private documents and sent them to other machines. This tactic left many “dumbfounded,” especially businesspeople whose company secrets were exposed to the public.

In light of this situation, Microsoft decided to replace Windows 9x with the Windows 2000 operating system utilizing Windows NT technology with NTFS disk formatting, considered superior to FAT32 in terms of organization and security. Following the robust Windows 2000, the stylish Windows XP was promoted by Microsoft with numerous superior features: support for multiple CPUs, strict memory management, improved disk access, protection of ActiveX executable code, strong multimedia support, and remote access control… In 2003, Microsoft officially announced the cessation of technical support for Windows 9x users, meaning that Windows 95, 98, and Me were “retired.”

Despite Microsoft’s efforts to enhance security, hackers continued their destructive activities. In 2001, the Blaster worm and later Sasser exploited the Remote Access Control vulnerability to issue shutdown commands to victims’ computers. This scenario was also executed by Slammer (2003) with even greater danger: crashing SQL Servers by sending messages through ports without writing virus code to the hard drive.

The year 2005 was a turbulent one with two notable events in the security field. The most significant was the counterfeiting and theft of various international credit cards. Security experts believed that this incident undoubtedly involved the assistance of software operating like computer viruses, secretly infiltrating database storage systems and stealing user ID numbers provided to counterfeit card printing facilities. The second event, less notorious but significant in its own right, was the confrontation between hacker organizations Mydoom and Netsky. Launching attacks and eliminating each other, hacker groups from various countries created chaos in the information technology world. To this day, although the conflict has eased, the names of these viruses remain on the “top-hot” list of security firms.

Seeking Solutions Against Viruses

In the battle against computer viruses, antivirus software plays the most active role. Utilizing libraries of known virus samples, antivirus programs quickly detect the presence of viruses in users’ computers. When there are fewer viruses and the frequency of unfamiliar viruses is low, the signature-based detection method proves quite effective. As the number of viruses increases, antivirus software finds itself at a disadvantage: only about 25 major companies confront roughly 150,000 different viruses. In this situation, antivirus software seeks to take proactive measures when outbreaks occur. This plan includes two main areas: increasing update speed and proactively detecting unusual virus samples. The first area involves expanding the team of experts updating new viruses, while the second focuses on researching advanced algorithms for intelligent detection of new viruses, timely preventing them before they spread. Each antivirus company chooses a different research direction: Symantec has Bloodhound, Sophos adopts a genetic approach, McAfee studies hashing, and BitDefender employs heuristics… Due to the inherent error in predictive modeling, customers must accept the risk: occasionally, antivirus programs mistakenly identify viruses in clean data. Although challenging and complex, this strategy is the inevitable trend of antivirus software development.

Despite the many efforts of antivirus programs, the landscape of the battle remains unchanged. Over 20 years of existence and development, viruses have not (and do not need to) change their attack scenarios: they exploit vulnerabilities (system security holes, users’ naivety, and curiosity) to execute their malicious intentions. Two noteworthy factors are the system (including the operating system and applications) and the computer user. Reality shows that tightly secured systems are less frequently attacked by viruses. Patchwork operating systems (fixes, patches) always provide fertile ground for computer viruses to flourish. Each time a system is reinforced, some virus types recede, and security conditions temporarily calm down. However, it is not long before outbreaks re-emerge with more insidious new viruses. Hence, network security and protection remain Microsoft’s top priority in the development plan for future 64-bit operating systems.

Users are the critical factor determining the survival of companies operating in the information technology sector. Users choose and spend money on quality IT products, allowing companies to continue to exist and produce better products. However, due to income disparities across countries, differences in consumer psychology, inappropriate pricing policies, and many other reasons, not all users are willing to open their wallets. The prevalence of software piracy in many countries worldwide not only harms manufacturers but also fuels the growth of illegal activities. A glance at the dark web of hacker groups reveals countless tools for software cracking, guides for illegal network infiltration, embedding trojans into websites, and even tutorials on creating viruses with an extensive library of source programs.

Observing the broader picture of 20 years of global viruses, we cannot help but wonder. As society develops, and information technology grows stronger, the underground activities of hackers also increase. Today, no one can guarantee absolute safety for any system, even those once deemed “invulnerable.” If not, why have the most advanced networks of technologically developed countries like the US, Europe, and South Korea still been attacked by hackers?

As society evolves, human relationships become increasingly complex. While in the 20th century, world wars aimed to resolve conflicts between two powers, in the 21st century, humanity must endure more catastrophes: ethnic wars, religious conflicts, riots, and terrorism… The opposing forces themselves are deeply divided. In the realm of information technology, today’s security battle is not merely a fight between computer viruses and antivirus programs but also a tense confrontation among hacker groups. The incident in which the US Air Force mistakenly shot at the Chinese embassy in Yugoslavia ignited a fierce battle between hacker groups from various countries on the Internet. Following the events of 9/11, investigations by US security agencies revealed that terrorist groups had communicated with each other using the Internet. There is a hypothesis that they used computer viruses to steal intelligence from various sources to prepare for the attack. Some hackers even named viruses after Bin Laden to send warning messages to the world! Military strategists predict that future wars will be inseparable from attacks on the opponent’s computer networks, crippling communication systems and controlling the enemy’s military equipment. This is not science fiction, as the Internet originated from the military network of the US military, right?

Thus, the answer to the human factor lies in the issue of awareness. If we say this, you may exclaim: “Is the computer virus issue ultimately a social problem?” Indeed, as long as humanity continues to harbor wicked ambitions, crime will decrease, and society will become more stable and secure. This is also an ideal vision of society that humanity has aspired to build for thousands of years. Each state is based on a certain philosophical doctrine. Each doctrine has a different way of resolving conflicts in human social life. However, all aim to build a stable and sustainably developed society. The remaining issue is just a matter of time.

We can believe in a future devoid of hackers. This belief is entirely grounded, as there have been significant changes within the ranks of Vietnamese hackers in recent years. Instead of writing viruses to annoy others, Vietnamese hackers have joined reputable IT companies or shifted to security research. This is a very positive sign for the Vietnamese Internet in the context of global hackers continuously attacking domestic systems. The participation of Vietnamese hackers in clarifying the iCMS case in 2005 is also a microcosm of a safe information technology world. Through this event, some hackers have left the underground world to step into the light, raising their voices to demand fairness in the game.

Conclusion

Over the past twenty years, humanity has witnessed many significant events, both achievements and losses. The world seems more fragile, with more risks. Computer viruses have also grown fiercer and more malicious. While humanity faces daily threats from terrorism, riots, and natural disasters, computer users must remain vigilant against a myriad of attacks and disturbances from rampant online misconduct and mobile devices. Where is the future of computer viruses headed? Obviously, they will accompany the development of human society. Computer viruses are a product of humanity, embodying human wrongdoing. As long as humanity cleanses itself of its sins, viruses will have no reason to exist.

WHAT’S NEW IN INFORMATION SECURITY 2006?

At the beginning of 2006, the annual international conference on Information Security (IS) organized by IBC, a member of the Information Systems Audit and Control Association, took place in Bangkok, Thailand. Mr. Vu Quoc Thanh, the director of Misoft and the first Vietnamese participant at this conference, stated:
The IS Conference 2006 predicted the main risks for the year. These include:
1. Email bombs and malicious emails
2. Spyware
3. Phishing and pharming attacks
4. Hackers targeting Google users
5. Risks associated with peer-to-peer applications
6. Risks of wireless local area networks
7. Instant messaging spam (spam IM)
8. Attacks from viruses and computer worms
9. Risks of mobile devices.
Many speakers emphasized two particularly dangerous types of attacks: Botnets and Zero-day attacks. A Botnet is a network of many computers infected with “bots” (short for robots), which are pieces of code that can hide in a computer and execute commands remotely. Sometimes, after infection, they remain dormant in the system for years, waiting for the right moment to activate, making them very difficult to detect.
A “zero-day attack” refers to attacks that can occur on the same day a new vulnerability is disclosed (often alongside the corresponding patch, but sometimes the patch is not ready). The success rate of these attacks is very high because even if a patch is released, not everyone can apply it immediately on the first day. Statistics show that in the last 6 months of 2005, from the time a new vulnerability was identified, it took only 6 days for attackers to develop an attack code, while manufacturers took an average of 54 days to release a patch.
Regarding IS services, there is a trend towards outsourcing cybersecurity management, especially for organizations with high security requirements and the need for rapid response (such as financial institutions and government agencies).
Reported by P.V.

Truong Minh Nhat Quang

Next Post
blogsites hacker green mu 4206

Blogsites "Green Hat Hacker"

create poster easily with posteriza 4207

Easily Create Posters with Posteriza

rockit 2000 pro dj 3 2 audio mixing software for dj 4208

RockIT 2000 Pro DJ 3.2: DJ Mixing Software

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FEATURED POST

the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

space monsters in mythology first appearance 129358

Cosmic Monster ‘in Legend’ Appears for the First Time

the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

The world’s most dangerous strait – The haunting toll measured in sailors’ lives

10 amazing natural phenomena that challenge science 60818

23 Mysterious Natural Phenomena That Challenge Science

TRENDING

nguoi ai cap co dai 650
Scientific Discoveries

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

the solo life of a forgotten girl in mexico 126989
Animal World

The Lonely Life of the Forgotten Panda in Mexico

how to charge new phone batteries correctly to avoid battery swelling 125779
Computer Science

The best way to charge a newly purchased phone battery to avoid battery degradation

oclantis city underwater octopus built 127886
Oceanography

Oclantis: The Underwater City Built by Octopuses

EDITOR PICK'S

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

Oclantis: The Underwater City Built by Octopuses

17 Causes of Throat Tightness and Belching

The Truth About the Mysterious Door Buried Deep in the Snow in Antarctica

12 Most Dangerous Poisonous Mushrooms in the World

23 Mysterious Natural Phenomena That Challenge Science

The best way to charge a newly purchased phone battery to avoid battery degradation

Newsletter

THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

Subscribe to our mailing list to receives daily updates direct to your inbox!

Category

  • 1001 Mysteries
  • AI – Artificial Intelligence
  • Aliens & UFOs
  • Animal World
  • Antibiotic Resistance
  • Archaeology
  • Bacteria & Insects
  • Biology
  • Biotechnology
  • Climate & Weather

Site Link

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Scimyst - Your gateway to the wonders of science and culture

No Result
View All Result
  • Home
  • Discoveries
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
      • Bacteria & Insects
      • Biotechnology
      • Plants
    • Doomsday
    • Famous Landmarks
    • History
      • This Day in History
    • Military Science
    • Mars Exploration
    • Oceanography
    • Science Q&A
    • Science Quiz
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
      • Cultural Heritage
      • Vietnamese Heritage
  • Technology
    • AI – Artificial Intelligence
    • Computer Science
    • New Technology
      • Self-Driving Cars
    • Scientific Inventions
  • Lifestyle
    • Cancer
    • Environment
      • Climate & Weather
      • Disasters
      • Latest Storm Updates
      • Nature
      • Solutions
    • Medicine & Health
      • Antibiotic Resistance
      • Common Illnesses
      • Dengue Fever
      • Family Medicine Cabinet
      • Food Safety
      • Health
      • Influenza Outbreak
    • Scientific Applications
  • Events
    • Science Events
    • Science Stories
    • Scientific Projects
  • Entertainment
    • Photo Library
    • Videos

© 2025 Scimyst - Your gateway to the wonders of science and culture