{"id":762,"date":"2015-11-06T14:02:25","date_gmt":"2015-11-06T14:02:25","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=762"},"modified":"2020-08-18T23:33:50","modified_gmt":"2020-08-18T18:03:50","slug":"the-era-of-computer-malware","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/","title":{"rendered":"The Era of Computer Malware"},"content":{"rendered":"<p>The relationship of computers with malwares is somewhat like Yin and Yang; they have contributed to each other&#8217;s development to this day, and inadvertently give business to one another. The existence of malwares is considered more bad then good, but there have been times in history when malwares were purposely designed for experimentation and learning. It was not until the time when people started creating malicious programs for harming to a network, when the cyber community started feeling uneasy.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware..png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-768 aligncenter\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware..png\" alt=\"Malware.\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware..png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p>So how did malwares come to the point where they are today? What&#8217;s the price we are paying for the damage they are doing, and where are we headed with them? These are some of the prevalent questions haunting the present world today, and we will try our bit to address the questions in this article. For the sake of clarity, we are using the term \u201cmalware\u201d as a blanket term to denote virus, Trojans, and all sundry malicious software, because malware is the broadest term to define them all.<\/p>\n<p><strong>History<\/strong><\/p>\n<p>Looking back, it&#8217;s hard to imagine a world without antivirus. Computer technology was taking baby steps, and the word &#8216;virus&#8217; had not yet been coined. In fact, it was first used by Frederick Cohen in a fictional novel that came out in 1983. Back then, malicious files were accidental results of juxtaposed coding, or a topic of speculation about what would happen if computers had minds of their own.<\/p>\n<p>One of the first big cases of a malwares came to light in 1981 when a program called Elk Cloner, authored by Richard Skrenta, began spreading in Apple DOS machines which, when affected, displayed a tongue-in-cheek poem on the computer screen. It spread through Apple machines and created some ripples in the public domain.<\/p>\n<p>Similarly in 1986, when two brothers who owned a computer store in Lahore, Pakistan wrote a code called \u201cBrain\u201d (named after their business outlet) to protect their medical software against copyright infringement. Little did they know that Brain&#8217;s boot sector would soon replace a floppy&#8217;s boot sector and disk label with it&#8217;s name, and spread like wildfire till the UK and even USA. Although harmless, the problem became a nuisance for IBM PC (powered by MS DOS) users.<\/p>\n<p class=\"western\" lang=\"en-US\">More instances like these fuelled active discussions in the tech community about virus as a possible threat to the computers and ways to curb their harm.<\/p>\n<p class=\"western\" lang=\"en-US\"><strong>The Damage<\/strong><\/p>\n<p class=\"western\" lang=\"en-US\">What started as a humble beginning of testing new <a href=\"https:\/\/www.comodo.com\/landing\/technology\/\" target=\"_blank\" rel=\"noopener\">technology<\/a> and accidental discoveries have now led to a lucrative industry for businesses on both sides of the fences. Thanks to the ever-growing range of threats that malwares pose to the infosec industry, the global <a href=\"https:\/\/antivirus.comodo.com\/\">antivirus<\/a> market is valued at a whopping $77 billion in 2015, and projected to be worth more than $170 billion by the year 2020.<\/p>\n<p class=\"western\" lang=\"en-US\">On the other hand, malware-related cybercrime accounts for as much as $55 billion per year, as far as the business sector is concerned. According to reports, the cost is calculated based on the average of 1.5 millions virus attacks that take place annually.<\/p>\n<p class=\"western\" lang=\"en-US\">One of the first viruses to send shock waves across the globe due to the collateral damage it caused was the ILOVEYOU virus. Within a week of its release in 2000, ILOVEYOU caused businesses all around the world to loose $5.5 billion, and the eventual damage totalled to $15 billion \u2013 a record high at the time.<\/p>\n<p class=\"western\" lang=\"en-US\">Similarly, Sobig was another infamous virus that spread through email in 2003 and wreaked havoc worth over $37 billion. Perhaps the most notorious of them all was Mydoom virus, which crippled the cyberworld and shook the industry&#8217;s confidence by causing a loss of nearly $38 billion. Dubbed as the fastest spreading virus, Mydoom was unleashed in 2004 and affected almost a quarter percent of all emails.<\/p>\n<p class=\"western\" lang=\"en-US\">As the pattern clearly shows, malware perpetrators are getting better at putting a dent to the economy. While the security sector is fast catching up with the modus operandi malware authors use, the safety measures need to be enhanced periodically for avoiding monetary and huge data loss.<\/p>\n<p><strong>What&#8217;s next<\/strong><\/p>\n<p class=\"western\" lang=\"en-US\">With the power of internet at their disposal, online consumers now have a ready access to\u00a0<a href=\"https:\/\/file-intelligence.comodo.com\/\" target=\"_blank\" rel=\"noopener\">malware search engines<\/a> to analyze malicious files and URLs, which enables them to select the appropriate tools to treat them accordingly from harming their system.<\/p>\n<p class=\"western\" lang=\"en-US\">But nobody is really winning in the tug of war between the malware creators and antivirus industry, although the cybercriminals are raking profits out of their illegal means. While there are groups of experts that have been forecasting the \u201cdeath of antivirus\u201d programs since many years, their claims have been proven wrong so far. Their claim that something else \u2013 such as, application control techniques \u2013 would replace the <a href=\"https:\/\/antivirus.comodo.com\">antivirus<\/a> products has not seen the light of the day yet, and probably won&#8217;t in the near future.<\/p>\n<p class=\"western\" lang=\"en-US\">However, it is true that the antivirus industry in general have hit a plateau because they have been employing the same tricks instead of innovating better remedies. With new and sophisticated malwares making news every now and then, it remains to be seen how antivirus manufacturers will emulate the industry&#8217;s expectations of being the saviour of the cyberworld, the guardian of the interweb.<\/p>\n<p class=\"western\" lang=\"en-US\"><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The relationship of computers with malwares is somewhat like Yin and Yang; they have contributed to each other&#8217;s development to this day, and inadvertently give business to one another. The existence of malwares is considered more bad then good, but there have been times in history when malwares were purposely designed for experimentation and learning. [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":769,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[26],"class_list":["post-762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Relationship of computers with malwares<\/title>\n<meta name=\"description\" content=\"The antivirus industry is engaged in a complex tug of war with malware authors who are raking huge profits through the illegal spread of computer virus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Relationship of computers with malwares\" \/>\n<meta property=\"og:description\" content=\"The antivirus industry is engaged in a complex tug of war with malware authors who are raking huge profits through the illegal spread of computer virus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-06T14:02:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T18:03:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"205\" \/>\n\t<meta property=\"og:image:height\" content=\"136\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/\",\"name\":\"Relationship of computers with malwares\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png\",\"datePublished\":\"2015-11-06T14:02:25+00:00\",\"dateModified\":\"2020-08-18T18:03:50+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"The antivirus industry is engaged in a complex tug of war with malware authors who are raking huge profits through the illegal spread of computer virus.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png\",\"width\":205,\"height\":136,\"caption\":\"mobile device management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Era of Computer Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Relationship of computers with malwares","description":"The antivirus industry is engaged in a complex tug of war with malware authors who are raking huge profits through the illegal spread of computer virus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/","og_locale":"en_US","og_type":"article","og_title":"Relationship of computers with malwares","og_description":"The antivirus industry is engaged in a complex tug of war with malware authors who are raking huge profits through the illegal spread of computer virus.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2015-11-06T14:02:25+00:00","article_modified_time":"2020-08-18T18:03:50+00:00","og_image":[{"width":205,"height":136,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/","name":"Relationship of computers with malwares","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png","datePublished":"2015-11-06T14:02:25+00:00","dateModified":"2020-08-18T18:03:50+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"The antivirus industry is engaged in a complex tug of war with malware authors who are raking huge profits through the illegal spread of computer virus.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Malware.png","width":205,"height":136,"caption":"mobile device management"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/the-era-of-computer-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Era of Computer Malware"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=762"}],"version-history":[{"count":27,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/762\/revisions"}],"predecessor-version":[{"id":15086,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/762\/revisions\/15086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/769"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}