In the beginning I saw two screenshots of a computer infected with the worst virus in the history of the world.
You must be surprised! These are screenshots of images from the operating system where the computer shows no signs of being infected with a virus.
If the malware targets your computer's data, it will not cause you the slightest problem or difficulty in using the computer.
You will feel free to use your computer and the malware will silently monitor your bank account number, debit or credit card number, your account PIN and password or personal information, photos, videos etc. The worst feature of the virus is that it will not enter your computer or mobile through the back door as a virus, but will enter your computer or mobile in the form of 'antivirus' in a friendly manner with your knowledge.
Suppose you were visiting a new website on the Internet when an ad appeared on your screen saying 'Your computer or mobile may have been infected by a virus'. So please download the Microsoft Security Antivirus.
One clicked on that ad, it took you to a site that is exactly themed with Microsoft theme and that site was able to identify your device model, name and operating system some information. This created your confidence in him. This time the site asked you to download the antivirus and completely free. The antivirus has been downloaded and you have installed it. Normally you will need the 'admin' user and password of your device. Why? Because the antivirus needs to be turned on! This time the software presented you with a 10 page ‘End User License Agreement’, which we have never seen in our lives. This time the antivirus software scans your entire device and then certifies that your device is OK, you are safe, so feel free to use it.
It's been a while.
Another day, when you went to download a hot image from a site, the antivirus software warned you that your device may be infected with a virus. You survived the ride in the sub!
After one month, the antivirus software notifies you that if you download the pro version of the antivirus for only 10 per month, it will destroy the virus.
__________________________________________
This story is more or less familiar to all of us. This time, from the beginning, let's turn to the fourth one in the flow of events. At first the ad was a lie. No ads can scan our computer or mobile device for viruses. No ads can say 'my device is infected'. Secondly, the site taken for antivirus download was fake. This is a fake site made by copy-pasting in the form of an original site. It is not difficult for a site you visit to provide the name, model and operating system information of the device. The offer to give you free antivirus was another devilish, like Nahid of Bikash, who grabbed important information by pretending to be a customer care officer.
Once your device's 'admin' user and password are in hand, it's only a matter of time before anyone gathers the necessary information about you. It is possible to observe what sites you visit, what you see, where you shop, what you download, everything.
Warning you when downloading high quality images was just an attempt at a better punishment. A malware can wait a long time before it starts working. You may not know that any malware that you downloaded as a student a decade ago may be working now. Waiting for you to be blackmailed or hacked into your information is his religion. He may take time to take control of one of your files and demand money.
This malware can automatically bring some more viruses to our device, let's say the software 'updates' and in the process unknowingly downloads more viruses.
Wanna-Cry is a type of computer virus whose characteristics are similar to those described above.
The gentleman robs you like a robber in the name of helping you recover lost files or data. You may not know that the files you are trying to retrieve were destroyed or destroyed by this helper. Not asking for money directly from you like extortion but collecting money in exchange for help. The amount of money is small at the beginning and will gradually increase later.
This virus enters our device in the form of an attachment to an email. Executable programs that can be remotely controlled are sent to us through document files.
The way to avoid such viruses is to keep a backup of important files. The computer's hard disk is not secure so save the files somewhere outside the computer. Recovering files from hard disk is expensive and in some cases impossible.
__________________________________________
Another scandal!
While you may be visiting a hot site, a pop-up pops up in your excitement. No matter how much you want to survive from these pop-ups, it is not possible. Because if he enters such a site, he will grab some information about your browser.
Comments
Post a Comment