×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

  • 14 February, 2021

  • 6 Min Read

NetWire

NetWire

  • NetWire, which first surfaced in 2012, is a well-known malware.
  • It is a remote access Trojan which gives control of the infected system to an attacker.
  • Such malware can log keystrokes and compromise passwords.

Viruses

  • A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program.
  • It spreads from one computer to another, leaving infections as it travels.
  • Viruses can range in severity from causing mildly annoying effects to damaging data or software and causing denial-of-service (DoS) conditions.
  • Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program.
  • When the host code (alternative word for a computer program) is executed, the viral code is executed as well.

Ransomware

  • Ransomware is a type of malicious software that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
  • While some simple ransomware may lock the system in a way that is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion.
  • This encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them.

Worms

  • Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage.
  • In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate.
  • To spread, worms either exploit the vulnerability on the target system or use some kind of social engineering to trick users into executing them.
  • A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided.
  • More advanced worms leverage encryption, wipers, and ransomware technologies to harm their targets.

Trojans

  • A Trojan is a harmful piece of software that looks legitimate.
  • After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses).
  • Trojans are also known to create backdoors to give malicious users access to the system.
  • Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
  • Trojans must spread through user interaction such as opening an email attachment or downloading and running a file from the Internet.

Bots

  • “Bot” is derived from the word “robot” and is an automated process that interacts with other network services.
  • Bots often automate tasks and provide information or services that would otherwise be conducted by a human being.
  • A typical use of bots is to gather information, such as web crawlers, or interact automatically with Instant Messaging (IM), Internet Relay Chat (IRC), or other web interfaces.
  • They may also be used to interact dynamically with websites.

Source: TH


India–Azerbaijan

A year after tensions arising from Operation Sindoor, India and Azerbaijan have taken steps to restore and normalise bilateral relations. The 6th round of Foreign Office Consultations, held in Baku, marked the first such engagement since 2022, signaling renewed diplomatic momentum. Recent Diplomatic Engagement During the consultations, bo

India–Australia Economic Cooperation and Trade Agreem

The India–Australia Economic Cooperation and Trade Agreement has completed four years since its signing. Both countries now aim to build on this progress through strengthened collaboration and ambitious targets, including reaching AUD 100 billion in bilateral trade by 2030. What is the India–Australia Economic Cooperation and Tra

ADR Report on Political Funding

A recent report by the Association for Democratic Reforms (ADR) analyses donations of ?20,000 or more declared to the Election Commission of India (ECI) by national political parties for FY 2024–25, highlighting transparency and accountability in political financing. Key Findings Massive Funding Surge Total donations to nationa

Maritime Chokepoints

Maritime chokepoints are narrow channels along global shipping routes where maritime traffic is concentrated. These points are geopolitically and economically critical, as they handle a large proportion of global trade, especially energy shipments. Current Relevance Over two-thirds of seaborne energy trade passes through a handful o

US-Israel-Iran War

Following the launch of Operation Epic Fury (U.S.) and Operation Roaring Lion (Israel), the geopolitical landscape has shifted fundamentally with the confirmed death of Iran’s Supreme Leader, Ayatollah Ali Khamenei.Iran retaliated through Operation True Promise 4, launching missile attacks against Israel and nearby Gulf states. The escala

DNA

05 Apr,2026

Toppers

Search By Date

Newsletter Subscription
SMS Alerts

Important Links

UPSC GS Mains Crash Course - RAW