How to find and whip Michelangelo

March 1992
U.S. News & World Report;3/2/92, Vol. 112 Issue 8, p19
Reports that on March 6, vital data on the hard disks of IBM-compatible computers--in many instances, the products of months of work--are in danger of being destroyed by a sinister computer virus called `Michelangelo.' What the name implies; Howthe virus was discovered; The computer company, Leading Edge found that it had sold 500 or more new machines that carried the infection; When the virus was first spotted; How the virus spreads; How to detect the virus.


Related Articles

  • Cracking down on computer crime. Markus, Erik // Boys' Life;Mar1993, Vol. 83 Issue 3, p30 

    Discusses the growing wave of computer crime taking place in the United States. Type of high-tech crimes; The challenge that faces law enforcers; The Secret Service's `Operation Sundevil' launched in 1990. INSET: Hacking is illegal..

  • Safe surfing on the Net. Kowalski, Kathiann M. // Current Health 2;Nov97, Vol. 24 Issue 3, p28 

    Provides information on the National Center for Missing and Exploited Children, who have details in approximately 50 crimes involving adult offenders who uses the Internet to commit crimes against teenagers. Identification of a number of these cases; Comments from Carolyn Caywood, a teen...

  • Computer crime categories. Carter, David L. // FBI Law Enforcement Bulletin;Jul95, Vol. 64 Issue 7, p21 

    Examines the categories of computer crime techno-criminals operate. Offenses with computer as the target including intellectual property; Computer as the instrumentality of the crime; Incidental to the crime; Computer-associated crimes; Perspective on legal issues; Special problems with...

  • Overcoming obstacles. Groover, Richard S. // FBI Law Enforcement Bulletin;Aug96, Vol. 65 Issue 8, p8 

    Opinion. Discusses the steps law enforcement agencies in the United States can take to prepare for computer-related crime. Difficulty in getting funds for the job; Role of the National White Collar Crime Center; Need to provide laptops and computer training to policemen.

  • Computer crime an emerging challenge for law enforcement. Carter, David L.; Katz, Andra J. // FBI Law Enforcement Bulletin;Dec96, Vol. 65 Issue 12, p1 

    Discusses the study on computer-related crimes. Trend of victimization in computer-related crimes; Who commits reported computer-related crimes; Illustration of how a computer crime can occur; Relationship between personal use of company computers and intellectual property theft; Problem of...

  • Uncle Sam struggles To Stamp Out Identity Theft. Deligiannis, Amalia // Corporate Legal Times;Oct2003, Vol. 13 Issue 143, p20 

    Focuses on regulations to prevent identity theft in the U.S. Credit card fraud; Cost of identity theft.

  • Computer crimes and criminals. McKeown, Patrick G. // National Forum;Summer92, Vol. 72 Issue 3, p46 

    Discusses various aspects of computer crime. Types of computer crimes; Profile of a computer criminal; Future of computer crime.

  • Computer crimes cost firms $137 million.  // Electric Light & Power;May98, Vol. 76 Issue 5, p16 

    Reports on the financial losses from computer crimes and information security breaches in the United States. Unauthorized access by employees; Service denial attacks; Theft of proprietary information; Financial fraud incidents; Sabotage of data or networks.

  • Hot outlet for Belgrade youth: Internet crime. Todorovic, Alex // Christian Science Monitor;5/16/2000, Vol. 92 Issue 122, p1 

    Discusses the high level of Internet crime among the youth in Belgrade, Serbia.

  • Safe not sorry. Stewart, Doug // Inc.;Fall92 Supplement, Vol. 14 Issue 9, p63 

    Examines information security. According to Robert Courtney, a computer-security consultant, damage from hackers and viruses has been trivial. By far most security-related losses result from blunders, figures entered in the wrong spaces, files consigned to oblivion by errant keystrokes. ...


Read the Article

Other Topics