Most of the general users of the internet may not even know what scripts are and how a cross site scripting attack can bring miseries to them or lead them to financial losses. They do not know that once their personal data has been acquired by others, it can be used to steal their identity, in turn allowing these thieves to access their bank or social media accounts. Recent incidents with Apple’s “Find My iPhone” and “Find My Mac” services exploited by the hackers locked out users from their own devices!! 1Įven though people who use the Internet are generally aware that it can present certain security threats, most do not realize the extent of these threats-and how they can harm their systems, financial assets, or privacy. The technologies allow knowledgeable hackers and crackers to connect to your system or your mobile or your tablet, sometimes without your even being aware of this. However, at the same time, these have also exposed us to unwanted downsides. Improved connectivity coupled with improved internetworking infrastructure has increased the speed at which we can connect when disasters occur, the ease with which we can do business across the globe, the ease with which we can share information with our peers, and the ease with which we can access knowledge. Unlike in the prior century, we are now in the era of a well-connected world which can be reached from one end to the other in a matter of seconds.
Unfortunately, all these new technologies and tools provide opportunities for people with bad intentions to find, understand, and exploit the loopholes or flaws in them. One strong example is that, even though these companies are aware that “non-validated inputs” are the most exploited, they still do not care to ensure proper validations. But, in this commercially oriented world, it seems that the companies are in a hurry to push across their technology and tools without strictly ensuring that the users of their technology and tools are protected. Additionally, they believe that these new technologies protect us or are designed to protect us. The general belief in today’s world is that, technologically we are getting more advanced, which is, of course, very true. Many countries are spying on each other and many militaries have a Cyber Warfare division. Of late, these are misused for political or religious gains or for terrorism. Many others do it for financial gains, for taking revenge, or to create fear in others.
Some people or groups use software or exploit software loopholes inappropriately, for fun or to highlight their technical skills. As science can be used for both good and bad purposes, software can also be used for both good and bad purposes. The intent of “Malicious Software,” as the name suggests, is to create harm or damage to systems or to people or to both.