Gigabyte (virus writer)

Last updated

Kimberley Vanvaeck, [1] also known by her online moniker Gigabyte, [2] is a virus writer from Belgium known for a long-standing dispute which involved the internet security firm Sophos and one of its employees, Graham Cluley. [1] [3] [4] [5] Vanvaeck wrote several viruses, including Quis, Coconut and YahaSux (also called Sahay). She also created a Sharp virus (also called "Sharpei"), credited as being the first virus to be written in C#. [2] [6]

Vanvaeck's dispute with Cluley began after he made several comments concerning the gender of virus writers. [6] This prompted Vanvaeck to write several viruses, that specifically targeted Cluley which were stated to be written as proof-of-concept rather than releasing them in the wild. [1]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

A script kiddie, skript kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes.

<span class="mw-page-title-main">Timeline of computer viruses and worms</span> Computer malware timeline

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<i>Hackers</i> (anthology) Science fiction anthology edited by Jack Dann and Gardner Dozois

Hackers is an anthology of science fiction short stories edited by Jack Dann and Gardner Dozois. It was first published in 1996. It contains stories by science fiction and cyberpunk writers of the late 1980s and early 1990s about hackers.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, programming scripts can all be forms of internet terrorism. Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

Norton AntiVirus is an anti-virus or anti-malware software product founded by Peter Norton, developed and distributed by Symantec since 1990 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Other features included in it are e-mail spam filtering and phishing protection.

<i>BBS: The Documentary</i> 2005 documentary film

BBS: The Documentary is a 3-disc, 8-episode documentary about the subculture born from the creation of the bulletin board system (BBS) filmed by computer historian Jason Scott of textfiles.com.

Zotob is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000, including the MS05-039 plug-and-play vulnerability. This worm has been known to spread on Microsoft-ds or TCP port 445.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Graham Cluley</span>

Graham Cluley is a British security blogger and the author of grahamcluley.com, a daily blog on the latest computer security news, opinion, and advice.

Norton AntiBot, developed by Symantec, monitored applications for damaging behavior. The application was designed to prevent computers from being hijacked and controlled by hackers. According to Symantec, over 6 million computers have been hijacked, and the majority of users are unaware of their computers being hacked.

<span class="mw-page-title-main">Mark Gasson</span> British research scientist

Mark N. Gasson is a British scientist and visiting research fellow at the Cybernetics Research Group, University of Reading, UK. He pioneered developments in direct neural interfaces between computer systems and the human nervous system, has developed brain–computer interfaces and is active in the research fields of human microchip implants, medical devices and digital identity. He is known for his experiments transmitting a computer virus into a human implant, and is credited with being the first human infected with a computer virus.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

<span class="mw-page-title-main">Happy99</span> Windows computer worm and early e-mail virus

Happy99 is a computer worm for Microsoft Windows. It first appeared in mid-January 1999, spreading through email and usenet. The worm installs itself and runs in the background of a victim's machine, without their knowledge. It is generally considered the first virus to propagate by email, and has served as a template for the creation of other self-propagating viruses. Happy99 has spread on multiple continents, including North America, Europe, and Asia.

Magic Lantern is keystroke logging software created by the United States' Federal Bureau of Investigation (FBI). Magic Lantern was first reported in a column by Bob Sullivan of MSNBC on November 20, 2001 and by Ted Bridis of the Associated Press.

<span class="mw-page-title-main">Kaspersky Lab</span> Russian multinational cybersecurity and anti-virus provider

Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky, and Alexey De-Monderik; Eugene Kaspersky is currently the CEO. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.

Merslau "Mers" Kutt CM is a Canadian inventor, businessman and educator. He is a former professor of mathematics at Queen's University. Through his company, Micro Computer Machines, he is the developer of the world's first keyboard-based portable microcomputer.

Soon after the release of HyperCard in 1987, computer viruses appeared that targeted the application. The viruses were written in the HyperTalk programming language and typically spread by infecting the Home stack and then infecting other stacks from there.

References

  1. 1 2 3 Holt, Thomas J.; Schel, Bernadette Hlubik (2010). Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. IGI Global. p. 146.
  2. 1 2 Parikka, Jussi (2007). Digital Contagions: A Media Archaeology of Computer Viruses. Peter Lang. p. 145.
  3. Salomon, David (2005). Foundations of Computer Security. Springer Verlag. p. 43. doi:10.1007/1-84628-341-8.
  4. Bocij, Paul (2006). The Dark Side of the Internet. Praeger. p. 57.
  5. Szor, Peter (2005). The Art of Computer Virus Research and Defense. Addison-Wesley Professional.
  6. 1 2 Thomas J. Holt, Bernadette Hlubik Schell (2013). Hackers and Hacking: A Reference Handbook. ABC-CLIO. p. 31.