Inside the Briefcase

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

with Srivats Ramaswami, 42Q
In this interview, Srivats Ramaswami,...

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

with Sander Barens, Expereo
In this interview, Sander Barens...

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

with Shawn Moore, Solodev
In this interview, Shawn Moore,...

Driving Better Outcomes through Workforce Analytics Webcast

Driving Better Outcomes through Workforce Analytics Webcast

Find out what’s really going on in your business...

Legacy Modernization: Look to the Cloud and Open Systems

Legacy Modernization: Look to the Cloud and Open Systems

On the surface, mainframe architecture seems relatively simple: A...

Infographic: Five Most Catastrophic Viruses of All Time

February 20, 2014 No Comments

Inforaphic created by Symantec Norton

Constant evolution

In the past, viruses and other kinds of malware would spread via spam email, booby-trapped websites which had been infected or malicious pop-up adverts. While all these are still common today, modern examples of malware causing damage have become more sophisticated, involving things like turning millions of PCs into miners for Bitcoins.

Viruses created today can be hard to both stop spreading and shift because of certain things like widespread use of wireless connections. However, the way in which malware is dealt with has improved, helped in no small part by the development of anti-malware software. Nevertheless, viruses, worms and Trojans are as dangerous as they have ever been.

VIEW INFOGRAPHIC BELOW

norton virus infographic Infographic: Five Most Catastrophic Viruses of All Time

 

 

 

Featured Articles, SECURITY

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner Infrastructure


Gartner Application Strategies


IBC 2017

ITBriefcase Comparison Report