Category Archives: Site Security

Top Computer Viruses

Computer viruses affect people all over the world. But which ones are the worst of all time? The following is a list of some of the most well known viruses and malware to be made public. Most virus protection software (e.g. Norton Antivirus, McAffee, or PC Tools Antivirus) on the market will protect you from these.

Melissa
Combine the illicit thrill of an exotic dancer with the manipulative genius of a hacker and you have one of the worst computer viruses of all time. Melissa was created by David L. Smith, named for his favorite Friday Night Gal, and released into the world on March 26th, 1999. Posing as an email attachment, the self-replicating virus activated when the malicious attachment was opened, then sent itself to the top 50 people in the email client contact list. The damage was so great that some companies had to shut down email programs until the virus was contained. Smith was convicted, fined $5,000 and spent 20 months in jail. Before Melissa, public knowledge of the detriment of malware was previously unknown.

ILOVEYOU/Love Letter
Ironically named, this love letter was sent from the Philippines in May of 2000 and wreaked havoc on computers around the world. Beginning as an email that claimed the attachment contained honey-filled words from a secret admirer, the subsequent worm that was unleashed worked in multiple ways. After copying itself into several different files and adding new registry keys to the victim’s computer, ILOVEYOU would then download a password stealing application that would email personal data to the hacker’s account. ILOVEYOU then used email and chat clients to send itself to other sources, further perpetuating the cycle. Some sources claim the ILOVEYOU computer virus caused over $10 billion in damages.

Code Red
Taking advantage of a vulnerability in Windows 2000 and Windows NT operating systems, the Code Red and Code Red II computer worms began to gain traction shortly after their 2001 release. Creating a large botnet by installing backdoors on infected machines, Code Red initiated a DDos (distributed denial-of-service) attack on the White House by commanding all computers within its extensive network to contact its web servers at one time. This act overloaded the servers, rendering them unable to perform their needed actions.

SQL Slammer/Sapphire
The SQL Slammer, also known as Sapphire, was a computer virus that infected the most heavily used web servers across the US at an alarming rate. In January of 2003, the SQL Slammer caused a number of issues including outages in 911 service in Seattle, crashed the Bank of America’s ATM service, and left Continental Airlines with so many electronic issues that they were forced to cancel flights. Over the course of the computer virus’ extensive life, it caused over $1 billion in damages before antivirus and antispyware software was able to patch the problem.

Sasser/Netsky
A relatively new exploit, Sasser, began to infect computers around the world on April 30th, 2004 by taking advantage of non-updated Windows 2000 and Windows XP operating systems. Once a PC was infected with Sasser, the malware would scan the PC for other unprotected computers in its network and replicate onto them. Aside from causing massive damage to the computer, Sasser also made shutting down any computer difficult without cutting off the power source. The same group of black hat hackers that created Sasser also took credit for Netsky, a virus that propagated through an email attachment, causing massive DDoS attacks. At their height, the two viruses were said to have cost tens of millions of dollars in damage, including forcing flight cancellations and delays for Delta Airlines and shutting down satellite communications a few French news agencies.

MyDoom
MyDoom makes the list for its ability to bring prominent search engines to their knees. In February of 2004, the creators of MyDoom released the first phrase of this virus into the world. The worm installed backdoors on computers and initiated a DoS attack. The worm was commanded to stop distributing just short of two weeks after it began. Later that year, MyDoom was released again with greater voracity. Like other viruses of its lot, MyDoom searched email contacts as a method of proliferating. Unlike other viruses, MyDoom also submitted these contacts as a query to search engines like Google in an unprecedented denial of service attack. With millions of search requests from corrupted computers coming in, search engines were significantly slowed and some even crashed.

Klez
Known as a computer virus that broke ground, Klez goes down in infamy as one of the most malicious viruses of all time. In late 2001, Klez began infecting computers through email messages that would install, replicate and then send themselves to every contact in the infected computer’s address book. Klez also used a tactic called “spoofing” – putting the names of people from the contact list in the “From” line and sending away – giving the impression that the email messages were coming from someone else. The malicious incarnation carried harmful programs that could function like a normal virus, disable antivirus software, or appear as a trojan. The worst forms of the virus rendered infected computers completely inoperable.

Don’t be caught without an antivirus software on your computer. At the least do it for your friends and family. You don’t want to be the person sending a virus that harms their computer or their contacts.

Top Computer Viruses

Computer viruses affect people all over the world. But which ones are the worst of all time? The following is a list of some of the most well known viruses and malware to be made public. Most virus protection software (e.g. Norton Antivirus, McAffee, or PC Tools Antivirus) on the market will protect you from these.

Melissa
Combine the illicit thrill of an exotic dancer with the manipulative genius of a hacker and you have one of the worst computer viruses of all time. Melissa was created by David L. Smith, named for his favorite Friday Night Gal, and released into the world on March 26th, 1999. Posing as an email attachment, the self-replicating virus activated when the malicious attachment was opened, then sent itself to the top 50 people in the email client contact list. The damage was so great that some companies had to shut down email programs until the virus was contained. Smith was convicted, fined $5,000 and spent 20 months in jail. Before Melissa, public knowledge of the detriment of malware was previously unknown.

ILOVEYOU/Love Letter
Ironically named, this love letter was sent from the Philippines in May of 2000 and wreaked havoc on computers around the world. Beginning as an email that claimed the attachment contained honey-filled words from a secret admirer, the subsequent worm that was unleashed worked in multiple ways. After copying itself into several different files and adding new registry keys to the victim’s computer, ILOVEYOU would then download a password stealing application that would email personal data to the hacker’s account. ILOVEYOU then used email and chat clients to send itself to other sources, further perpetuating the cycle. Some sources claim the ILOVEYOU computer virus caused over $10 billion in damages.

Code Red
Taking advantage of a vulnerability in Windows 2000 and Windows NT operating systems, the Code Red and Code Red II computer worms began to gain traction shortly after their 2001 release. Creating a large botnet by installing backdoors on infected machines, Code Red initiated a DDos (distributed denial-of-service) attack on the White House by commanding all computers within its extensive network to contact its web servers at one time. This act overloaded the servers, rendering them unable to perform their needed actions.

SQL Slammer/Sapphire
The SQL Slammer, also known as Sapphire, was a computer virus that infected the most heavily used web servers across the US at an alarming rate. In January of 2003, the SQL Slammer caused a number of issues including outages in 911 service in Seattle, crashed the Bank of America’s ATM service, and left Continental Airlines with so many electronic issues that they were forced to cancel flights. Over the course of the computer virus’ extensive life, it caused over $1 billion in damages before antivirus and antispyware software was able to patch the problem.

Sasser/Netsky
A relatively new exploit, Sasser, began to infect computers around the world on April 30th, 2004 by taking advantage of non-updated Windows 2000 and Windows XP operating systems. Once a PC was infected with Sasser, the malware would scan the PC for other unprotected computers in its network and replicate onto them. Aside from causing massive damage to the computer, Sasser also made shutting down any computer difficult without cutting off the power source. The same group of black hat hackers that created Sasser also took credit for Netsky, a virus that propagated through an email attachment, causing massive DDoS attacks. At their height, the two viruses were said to have cost tens of millions of dollars in damage, including forcing flight cancellations and delays for Delta Airlines and shutting down satellite communications a few French news agencies.

MyDoom
MyDoom makes the list for its ability to bring prominent search engines to their knees. In February of 2004, the creators of MyDoom released the first phrase of this virus into the world. The worm installed backdoors on computers and initiated a DoS attack. The worm was commanded to stop distributing just short of two weeks after it began. Later that year, MyDoom was released again with greater voracity. Like other viruses of its lot, MyDoom searched email contacts as a method of proliferating. Unlike other viruses, MyDoom also submitted these contacts as a query to search engines like Google in an unprecedented denial of service attack. With millions of search requests from corrupted computers coming in, search engines were significantly slowed and some even crashed.

Klez
Known as a computer virus that broke ground, Klez goes down in infamy as one of the most malicious viruses of all time. In late 2001, Klez began infecting computers through email messages that would install, replicate and then send themselves to every contact in the infected computer’s address book. Klez also used a tactic called “spoofing” – putting the names of people from the contact list in the “From” line and sending away – giving the impression that the email messages were coming from someone else. The malicious incarnation carried harmful programs that could function like a normal virus, disable antivirus software, or appear as a trojan. The worst forms of the virus rendered infected computers completely inoperable.

Don’t be caught without an antivirus software on your computer. At the least do it for your friends and family. You don’t want to be the person sending a virus that harms their computer or their contacts.

Failsafe Payments Adds SecurityMetrics PCI Services for U.S. & EU Merchants

PCI DSS Compliance Program Joins Failsafe’s Merchant Account & Gateway Offerings

CLEVELAND, OH & NICOSIA, CYPRUS (October 12, 2010) – Failsafe Payments, a Merchant Service Provider in both North America and Europe, today announced the addition of Payment Card Industry Data Security Standard (PCI DSS) compliance services from SecurityMetrics to help merchants meet industry requirements and prevent theft of customer card data. Benefits to participating merchants on both continents include a 175-person SecurityMetrics call center available 24×7 to answer PCI-related questions as part of the low annual fee.

The new PCI DSS compliance validation service joins Failsafe’s merchant account program and Certo Payment Gateway, an integrated merchant and MSP e-commerce platform enabling authentication and acceptance of multiple payment options and services for online transactions. Failsafe’s expanded portfolio enables merchants to source multiple card payment services from a single provider.

“Our target merchants are smaller and mid-sized businesses that typically need hands-on assistance to understand the Self-Assessment Questionnaire and other PCI DSS requirements. Online self-service systems are not sufficient,” said John Williams, president of Failsafe Payments. “With SecurityMetrics, both our North American and European customers will have around-the-clock access to PCI specialists who can walk them through the processes required to keep customer card data safe from attack.”

For merchants, other benefits of SecurityMetrics’ PCI DSS compliance services include a proprietary scanning engine that checks for more points of Internet security than other vendors, a Site Certification Report that lists each potential entry point individually to assist in closing security gaps, and a flat annual fee with no add-on charges.

For acquirers and ISOs like Failsafe Payments, benefits include email, fax and outbound calling campaigns to encourage merchant enrollment and a robust web-based Merchant Compliance Console that provides detailed real-time portfolio compliance progress, drilldown to merchant scan and questionnaire results, and easy PCI compliance reporting.

“Level 4 PCI DSS compliance remains a challenge for payment services providers as well as merchants themselves,” said SecurityMetrics CEO Brad Caldwell. “Companies like Failsafe Payments that proactively help merchants meet their regulatory obligations are playing an important role in thwarting security breaches, reducing card fraud and protecting consumers from the consequences.”

The PCI DSS is a comprehensive set of global security requirements developed by the PCI Security Standards Council in order to safeguard cardholder data worldwide. The organization was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa, Inc.

About SecurityMetrics
SecurityMetrics, Inc. is a leading provider of Payment Card Industry (PCI) Data Security Standard (DSS) security solutions, including the most successful mass-merchant compliance model in the industry. The company is certified to perform PCI Scans (ASV), PCI audits (QSA), Payment Application Data Security Standards audits (PA-QSA), penetration tests and forensic incident response assessments (QIRA). SecurityMetrics also offers a security appliance that includes vulnerability assessment, intrusion detection and intrusion prevention capabilities. SecurityMetrics is a privately held corporation headquartered in Orem, Utah. For more information, contact SecurityMetrics at (801) 724-9600 in North America, 0207.993.8030 in Europe or 61.2.8011.3270 in Australia, or visit www.securitymetrics.com.

About Failsafe Payments
Failsafe Payments is a Merchant Service Provider (MSP), based in Nicosia, Cyprus and Cleveland, Ohio. The company offers both merchant accounts and a single integration e-commerce platform called Certo Payment Gateway that connects merchants and MSP’s around the world with worldwide banks, payment brands, payment processors, shopping carts, alternative payments, 3-D Secure and third-party services such as advanced fraud scrubbing and loyalty programs. For more information, visit www.failsafepayments.com.