Categories: Blog

Logic Bomb

[vc_row][vc_column][vc_column_text]

What is a logic bomb?

Logic bombs, though different than a computer virus, act in similar ways to execute a dangerous attack like erasing files or an entire hard drive at a specific time when triggered by a specific event.

Are logic bombs dangerous?

Logic bombs are programs or pieces of a program that can be designed to “detonate” on a particular date and time or when a specific file is deleted.

They can also detonate when a hard drive reaches a predetermined capacity level.

Logic bombs, according to security experts, are typically installed on a computer or system by someone who has inside access to the that system, such as an employee.

In many instances, a logic bomb is created and left by a disgruntled employee.

In one instance that made national headlines, the systems administrator for a company installed a logic bomb on a computer system.

The hope was that the damage it would cause would manipulate the company’s stock prices.

The suspect’s logic bombs erased computer files, and he was ultimately charged with federal crimes related to computer and securities fraud.

Logic bombs can install codes with fake applications, or place a Trojan horse onto a computer system.

Spyware can also be combined with logic bombs to steal someone’s identity.

Hackers have been known to install keyloggers onto a victim’s computer to see every keystroke made on the victim’s system.

This could provide criminals with private information such as usernames and passwords or bank account details.

The spyware works with the logic bomb, which is detonated once the victim triggers a certain action, like visiting a banking website or social media program.

The logic bomb would essentially detonate, triggering the keylogger and stealing identity information that will be sent to a hacker.

How do I avoid the threat of a logic bomb?

Constantly monitor your system with antivirus software and other programs that scan for new files that might be placed on a computer.

This will be necessary not only for the larger network as a whole, but each computer using that network should also be monitored individually.

Consider restricting access and responsibilities for your employees.

Ensure your computer and systems are backed up and available for recovery in the case of a logic bomb being used maliciously on your system.

Logic bombs can be embedded inside Trojan horses, so use caution to avoid malicious software products disguised as legitimate ones.

Don’t download pirated software, and avoid suspicious email attachments that could contain logic bombs or other malicious programs.

Keep your operating system updated so it’s aware of the latest threats that exist and can detect their presence.[/vc_column_text][/vc_column][/vc_row]

Areyo Dadar

Share
Published by
Areyo Dadar

Recent Posts

New Comparison Chart

fhjfgn

2 years ago

LifeLock Reviews

[vc_row][vc_column][vc_column_text] [simple_tooltip content='** Credit card required at enrollment. If you`re not completely satisfied within your…

2 years ago

Identity Guard Reviews

[vc_row][vc_column][vc_single_image image="8699" img_size="full"][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text="What We Love About Identity Guard" font_container="tag:h2|font_size:30px|text_align:left|color:%23446084" google_fonts="font_family:Coda%3Aregular%2C800|font_style:400%20regular%3A400%3Anormal"][vc_column_text] $2000 emergency cash if…

2 years ago

Dumpster Diving

[vc_row][vc_column][vc_column_text] Dumpster Diving Did you ever wonder what kinds of people dig through dumpsters in…

2 years ago

Credit Freeze: The Definitive How to Guide (50 state interactive map)

[vc_row][vc_column][vc_column_text] If you’re worried about identity theft and want to stop anyone trying to gain…

2 years ago

Why Is It So Hard To Catch Identity Thieves?

  What if I were to tell you that 15 million Americans fall victim to…

2 years ago