Feeds

Virus writers have girlfriends - official

And some don't even need inflating

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

The stereotype of virus writers as spotty nerds who can't pull is well wide of the mark, according to an expert on the psychology of virus writers. Sarah Gordon, senior principal research engineer at Symantec Security Response, said that the more recent idea that virus writing activity is focused mainly around money-making scams is inaccurate.

Gordon - sometimes described as the Clarice Starling of anti-virus security - has interviewed over a hundred virus writers in the course of years of research. She found the type of person who causes the disruption that accompanies the release of malicious code varied considerably by age, education, income, interests and social skills.

"Most of the adult males I've interviewed have had girlfriends. Female virus writers have had boyfriends. The stereotypes are wrong," Gordon told El Reg.

Gordon drew a distinction between viruses created out of technical curiosity - which still account for the majority of "in-the-wild" viruses - and malicious code created by criminal elements in the hacking community as a way of stealing personal information on computer resources. Agobot, Bagle and the like get all the publicity but the vast majority of viruses are written by people as a technical challenge. These nuisance virus writers have no conception of the damage and inconvenience their creations can cause. "Virus writing is irresponsible but not difficult," she said.

For years, Gordon has attended conferences and conventions attended by virus writers and corresponded with them online as a way of better understanding the motives behind virus creation and how it might be possible to make VXers stop their anti-social activities. She is over in Europe to complete final work on a thesis for her PhD in computer science. ®

Related stories

Virus writers obsessed with sex and computer games
Belgian police arrest female virus writer
Anna-bug author OnTheFly 'fesses up
The strange death of the mass mailing virus
Botnets, phishing and spyware

Choosing a cloud hosting partner with confidence

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.