Based on this, the latest attackers include Trojan horse, backdoors, phishing, and spyware, which are commonly transmitted through the . rar files (Symantec Corporation, 2010). Spam messages can contain crimeware programs such as Trojan horses, spyware and bots as well as enhance phishing. The complexity in identifying and disinfecting current virus attacks is that they tend to use multiple vectors to spread as well as showing limited signs of their presence to the user.
Current virus attacks harm the networks in a number of ways such as corrupting file information and computer configurations, thus compromising the reliability of the system to the user (Siles, 2010). Theses attacks can also lead to Distributed Denial of Service to an authorised user as evident from some case reported in January and August this year. Trojan horse inhibits shutting down of the infected system while backdoors allows for bypassing of the authentication provisions to access the system (Symantec Corporation, 2010).
According to available information, PCs are more vulnerable to current virus attacks. This is particular when such computers lack proper configurations and in effective virus protection versions. Another vulnerable platform is PCs used by individuals with limited or no information of the various ways viruses use to enter into a computer system (Fisher, 2005). Thus, awareness and constant anti-virus updating can significant help in protecting computer against current virus attacks.
Symantec Corporation. (2010). Virus & Risks. Retrieved August 16, 2010, from http://www. symantec. com/norton/security_response/ Fisher, D. (2005). New Virus Attack Technique Bypasses Filters. Retrieved August 16, 2010, from http://www. eweek. com/c/a/Security/New-Virus-Attack-Technique-Bypasses-Filters/ Siles, R. (2010). The Seven Deadly Sins of Security Reporting. Retrieved August 16, 2010, from http://isc. sans. edu/index. html