Friday 25 July 2014

Term Of the Day - Bladabindi

Computer_Tech2_NEW-624x351.jpg
Bladabindi has been creating prowl over the Indian Cyberspace

"BLADABINDI"


The oddly spelled “Bladabindi” family is the latest threat looming over the Indian cyberspace . As per reports of CERN-In , the particular Bladabindi.B variant  , essentially a trojan is the most frequently detected and the most malignant of the lot , which makes clandestine multi-identity efforts to gain access to personal data , and use them for nefarious purposes .

The victims lists is hugely populated with “Windows Operating System users “ , the most common mode of propagation of the virus is via USB devices commonly called pen-drives and data cards . CERT-In , the nodal national agency for cyber threats across the Indian internet domain has already issued advisories for the same .
Bladabindi iconic aliases
In an official statement , it stated “Bladabindi variants can take up as much as 12 different aliases to conceal its identity . It can also come across as a malware downloader , in turn creating a backdoor entry route for further injection”.


A typical Bladabindi propagates by copying itself to the root folder of a removable drive , creating a shortcut icon . When clicked upon , it causes an explorer window to open , simultaneously executing the malware in background . So , while the user can remain rest assured with the normal functioning of the system , Bladabindi would have reported its creator accomplishment of new victimisation .

A potential attack by Bladabindi can result in loss of proprietary data such as computer name ,country , serial number , windows user details , chrome ,  internet explorer stored passwords , etc . It can also employ an dll file to the webcam of the infected system to record and send media to the remote attacker . The remote attacker can even snatch control of the system .
So , the next time round that we insert a external drive from the most trusted of our friends , lets go by a casual scan , lest our friend might be unknowingly  introducing us to Bladabindi’s net !!


Tuesday 22 July 2014

All about the blog

This blog is laid out with the sole aim of information interchange to mutually benefit both the users and the writers . Here , we aim to cover all tit bits needed to be idling around the mind of a good IT student . We also plan to get the happenings of the techno world on the silver screen with our newsletter " The Techno Times " .
We aim to be as precise and up to date in our posts as possible , but we encourage corrective and productive suggestions from our readers .
Hope you have a productive , and interactive reading experience with us .
-Abi
( Head of Publish )

Term Of The day - Overwriting Virus

Defination :

repeated execution of the same line of code !!
It is a malicious program , which after infliction will effectively destroy the original program code , typically by overwriting itself in the system memory . It is considered to be extremely harmful as it destroys the user’s elements .

Examples :

1.       The TRJ Boot virus , which causes Visual Basic 5 files to rewrite themselves . It can also cause repeated restart in the systems .
2.       Trivial.88.D virus , or the” direct  attacking virus” , that makes repeated execution of executable files .

Remedy :

Standard remedial operation involves removing the inflicted and holding program , and then reinstalling the program .