Michelangelo disappoints the virus hunters

Webb, S.; Fox, B.
March 1992
New Scientist;3/14/92, Vol. 133 Issue 1812, p10
Reveals that the Michelangelo computer virus was far less damaging than newspapers and broadcasters had predicted. Damage that it did do; Assessments of the situation in the United States; Other viruses in existence.


Related Articles

  • Rapid spread of virus confirms fears about... Nordwall, B.D. // Aviation Week & Space Technology;11/14/1988, Vol. 129 Issue 20, p44 

    Discusses the virus that recently infected several thousand US computers and the security concerns it raised. At issue is how to increase protection without slowing the flow of information. No classified systems were involved. Robert T. Morris, Jr., 23, is the suspected virus creator.

  • Cracking down on computer crime. Markus, Erik // Boys' Life;Mar1993, Vol. 83 Issue 3, p30 

    Discusses the growing wave of computer crime taking place in the United States. Type of high-tech crimes; The challenge that faces law enforcers; The Secret Service's `Operation Sundevil' launched in 1990. INSET: Hacking is illegal..

  • Safe surfing on the Net. Kowalski, Kathiann M. // Current Health 2;Nov97, Vol. 24 Issue 3, p28 

    Provides information on the National Center for Missing and Exploited Children, who have details in approximately 50 crimes involving adult offenders who uses the Internet to commit crimes against teenagers. Identification of a number of these cases; Comments from Carolyn Caywood, a teen...

  • Computer crime categories. Carter, David L. // FBI Law Enforcement Bulletin;Jul95, Vol. 64 Issue 7, p21 

    Examines the categories of computer crime techno-criminals operate. Offenses with computer as the target including intellectual property; Computer as the instrumentality of the crime; Incidental to the crime; Computer-associated crimes; Perspective on legal issues; Special problems with...

  • Overcoming obstacles. Groover, Richard S. // FBI Law Enforcement Bulletin;Aug96, Vol. 65 Issue 8, p8 

    Opinion. Discusses the steps law enforcement agencies in the United States can take to prepare for computer-related crime. Difficulty in getting funds for the job; Role of the National White Collar Crime Center; Need to provide laptops and computer training to policemen.

  • Computer crime an emerging challenge for law enforcement. Carter, David L.; Katz, Andra J. // FBI Law Enforcement Bulletin;Dec96, Vol. 65 Issue 12, p1 

    Discusses the study on computer-related crimes. Trend of victimization in computer-related crimes; Who commits reported computer-related crimes; Illustration of how a computer crime can occur; Relationship between personal use of company computers and intellectual property theft; Problem of...

  • Uncle Sam struggles To Stamp Out Identity Theft. Deligiannis, Amalia // Corporate Legal Times;Oct2003, Vol. 13 Issue 143, p20 

    Focuses on regulations to prevent identity theft in the U.S. Credit card fraud; Cost of identity theft.

  • Computer crimes and criminals. McKeown, Patrick G. // National Forum;Summer92, Vol. 72 Issue 3, p46 

    Discusses various aspects of computer crime. Types of computer crimes; Profile of a computer criminal; Future of computer crime.

  • Computer crimes cost firms $137 million.  // Electric Light & Power;May98, Vol. 76 Issue 5, p16 

    Reports on the financial losses from computer crimes and information security breaches in the United States. Unauthorized access by employees; Service denial attacks; Theft of proprietary information; Financial fraud incidents; Sabotage of data or networks.

  • Hot outlet for Belgrade youth: Internet crime. Todorovic, Alex // Christian Science Monitor;5/16/2000, Vol. 92 Issue 122, p1 

    Discusses the high level of Internet crime among the youth in Belgrade, Serbia.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics