chunk_id
stringlengths
5
8
chunk
stringlengths
1
1k
1454_67
3 December 1970: A machine gun attack on the Spanish Embassy in London was carried out by the First of May Group. 9 December 1970: A bomb was planted by the Angry Brigade exploded at the Department of Employment and Productivity in St. James's Square, London, shortly after a police search.
1454_68
1971 12 January 1971: Two bombs planted by the Angry Brigade exploded at the Hertfordshire home of the Minister of Employment Robert Carr. 18 March 1971: A bomb was planted by the Angry Brigade at the offices of the Ford Motor Company at Gants Hill, Ilford. There was a strike at Ford Dagenham throughout the summer. 1 May 1971: A bomb planted by the Angry Brigade exploded at the Biba boutique in Kensington 22 July 1971: A bomb planted by the Angry Brigade exploded at the home of William Batty, a director of the Ford plant at Dagenham. Another bomb damaged a transformer at the Dagenham plant. The Bomb Squad was established at Scotland Yard in January 1971 to target the Angry Brigade, and following raids on the homes of suspects, they were arrested in August 1971. 1984 20 April 1984: 1984 Heathrow Airport bombing: 22 were injured by a bomb in the airport baggage area. The Angry Brigade claimed responsibility, but officials blamed Libyan-linked groups.
1454_69
Militant Suffragette actions With increased militancy in the Women's Social and Political Union in 1912, a bombing and arson campaign was started. Both some Suffragettes and the authorities talked of arson and bomb attacks as terrorism. Contemporary newspaper reports in the UK and in the US likewise spoke of "Suffragette Terrorism" in the UK. Modern scholarship has a range of views as to the applicability of the term "terrorism" to these events. 1912 29 November 1912: Simultaneous suffragette attacks on post boxes occurred across the entire country using dangerous chemicals. In London, many letters burst into flames upon discovery at post offices. Paraffin and lit matches are also put in pillar boxes.
1454_70
1913 8 February 1913: Suffragette arson attack on the Orchid House at Kew Gardens. 19 February 1913: Suffragette bomb attack on Lloyd George's house, planted by Emily Davison. Significant damage was done to the building, but there were no injuries. 20 February 1913: Suffragette arson attack destroying the Tea Pavilion at Kew Gardens. Olive Wharry and Lilian Lenton were arrested at the scene and both imprisoned. 22 February 1913: A postman was burned at Lewisham post office, south London, when handling a suffragette letter bomb. 4 April 1913: Gunpowder bomb placed outside the Bank of England by Suffragettes, but it is diffused before it can detonate in the public street.
1454_71
9 April 1913: Two bombs were left on the Waterloo to Kingston train line by suffragettes, placed on trains going in opposite directions. One bomb was found at Battersea on the train coming from Kingston when the railway porter discovered smoke in a previously crowded third-class carriage. Four hours later, as the other train from Waterloo pulled into Kingston, the third-class carriage exploded and was consumed by fire. The rest of the carriages were full of passengers, but they manage to escape. 18 April 1913: A suffragette plot to blow up the grandstand at Crystal Palace football ground on the eve of the 1913 FA Cup Final is foiled. May 1913: Three London postmen are injured by their exposure to noxious substances the suffragettes purposely placed in pillar boxes.
1454_72
2 May 1913: The suffragettes plant a highly unstable nitroglycerine bomb on the platform at Piccadilly Circus tube station. Although it had the potential to harm many members of the public, the bomb is successfully diffused. 7 May 1913: A bomb is planted by the suffragettes at St. Paul's Cathedral, London, but it is discovered. 10 May 1913: A suffragette bomb is discovered in the waiting room at Liverpool Street Station, covered with iron nuts and bolts intended to maximise damage to property or anyone in proximity. 14 May 1913: A letter bomb is sent by suffragettes to anti-women's suffrage magistrate Sir Henry Curtis-Bennett at Bow Street in an attempt to assassinate him. The bomb is intercepted by London postal workers. Suffragettes again attempt to assassinate Curtis-Bennett by pushing him off a cliff two days later at Margate.
1454_73
14 May 1913: Three suffragette bombs are discovered in the third-class carriage of a crowded passenger train arriving from Waterloo at Kingston, filled with nitro-glycerine. 16 May 1913: A suffragette bomb is discovered at Westbourne Park tube station before it can explode. 2 June 1913: Suffragette bomb discovered at the South Eastern District Post Office, London, containing enough nitroglycerin to blow up the entire building and kill the 200 people who worked there. 18 December 1913: The suffragettes bomb a wall at Holloway Prison in an attempt to free an inmate inside. Many houses near the prison were damaged or had their windows blown out by the bombs, showering some children with glass while they slept. One of the perpetrators of the attack was injured by the blast.
1454_74
1914 5 April 1914: A bomb exploded in St Martin-in-the-Fields church in Trafalgar Square, London, blowing out the windows and showering passers-by with broken glass. The explosion started a fire in the church. The suffragettes are responsible. 11 May 1914: A bomb is discovered before it can explode in the Metropolitan Tabernacle church, London. The bomb was placed by the suffragettes. 11 June 1914: A bomb explodes at Westminster Abbey; damaging the Coronation Chair. The suffragettes are responsible. 13 June 1914: A suffragette bomb is discovered before it can explode in St. Paul's Cathedral.
1454_75
Other attacks in the 20th century 31 October 1971: A bomb exploded at 0430GMT on the 33rd floor of the Post Office Tower causing extensive damage but no injuries. Shortly after the blast the tower and the restaurant were closed to the public. The "Kilburn Battalion" of the IRA claimed responsibility for the explosion. The attack was later attributed to the Angry Brigade, it remains unclear who was responsible. 20 December 1975: Biddy Mulligan's pub bombing: The Ulster Defence Association (UDA) bombs Biddy Mulligan's pub in Kilburn, injuring five people. 7 January 1981: A letter bomb sent to Prime Minister Margaret Thatcher was intercepted by a London postal worker. The Scottish Socialist Republican League claimed responsibility in a telephone call to a newspaper.
1454_76
14 March 1982: 1982 bombing of the African National Congress headquarters in London: The London offices of the African National Congress were wrecked by an bomb which exploded against the rear wall at 9 am. Windows up to 400 yards away were broken. The caretaker, an ANC voluntary worker, who was sleeping in a flat above the offices, was injured. Nine former South African security policemen admitted to the attack at an amnesty hearing of the Truth and Reconciliation Commission in Pretoria in 1999. 22 November 1982: A letter bomb was sent to Industry Secretary, Patrick Jenkin. It was intercepted by his secretary and made safe. The Scottish National Liberation Army (SNLA) claimed responsibility and said it was in retaliation for the partial closure of a steelworks in Motherwell. In 1983 there were 27 SNLA attacks, including letter-bombs to Margaret Thatcher (sent to a north London hotel where she was speaking, opened by Robert Key MP and made safe) and the Princess of Wales.
1454_77
April 1985: The SNLA detonated a small bomb inside a Ministry of Defence building, causing significant damage to the property. 31 October 1985, Tony Lecomber, a right-wing activist, was injured by a nail bomb that he was carrying to the offices of the Workers Revolutionary Party in Clapham. Police found 10 grenades, seven petrol bombs and two detonators at his home. He received a three-year prison sentence. 6 December 1994: Edgar Pearce bombs six Barclays Bank branches throughout north and west London. Two members of staff were injured. 19 May 1995 to 20 April 1996: Edgar Pearce launches a series of 18 small bombings throughout London. One device at a Barclays Bank in Ealing on 20 April 1996 injured three people. 15 November 1997 to 17 March 1998: Edgar Pearce planted 11 devices near Sainsbury's stores throughout London.
1454_78
17 to 30 April 1999: 1999 London nail bombings, a neo-Nazi with paranoid schizophrenia carried out nail bomb attacks over three weekends against ethnic minorities and gay people in Brixton, Brick Lane and the Admiral Duncan pub in Old Compton Street, killing three people, including a pregnant woman, and injured 139, four of whom lost limbs. Copeland was convicted and given six concurrent life sentences.
1454_79
Attacks in the 21st century Excluding post-Belfast Agreement Irish republican attacks in 2000 and 2001 (see above). 2005 7 July 2005: 7 July bombings: A series of four coordinated suicide attacks in central London in which three bombs exploded on Underground trains between Aldgate and Liverpool Street stations, Russell Square and King's Cross St Pancras stations and Edgware Road and Paddington stations. A double-decker bus at Tavistock Square was also destroyed. The bombs were detonated by four British Islamist suicide bombers. The explosions killed 52 people and resulted in over 700 injuries. 21 July 2005: 21 July attempted bombings: Four more bombings, unconnected with those on 7 July, were attempted on 21 July 2005 at Shepherd's Bush, Warren Street and Oval stations, as well as on a bus in Shoreditch. In these incidents, each bomb detonator fired, but did not ignite the main explosive charge.
1454_80
2007 29 June 2007: 2007 London car bombs: Two unexploded car bombs were discovered in London. The first device was found in a car parked near the Tiger Tiger nightclub in Haymarket. Two large gas canisters and a large number of nails were found in the car. The second device was left in a blue Mercedes-Benz saloon in nearby Cockspur Street, but was not discovered until after the car had been towed away for illegal parking. 2013 22 May 2013: Murder of Lee Rigby: A British Army soldier, Fusilier Drummer Lee Rigby of the Royal Regiment of Fusiliers, was attacked and killed by Michael Adebolajo and Michael Adebowale near the Royal Artillery Barracks in Woolwich, southeast London.
1454_81
2016 On 20 October 2016, police conducted a controlled explosion on an improvised explosive device at North Greenwich after a passenger spotted an unattended bag filled with "wires and an alarm clock" aboard a Jubilee line train. The bomb failed to go off, and police said that it could have caused casualties had it exploded. The media and government called the events a "lapse of security" and the "most serious incident on the Tube since the 21/7 attempted bombing". It was later revealed that the bomber, Damon Smith, had "an interest in Islam" and had posed next to a photo of an Islamic extremist – although the judge in his case believed that he was not motivated by terrorism, but could not determine what his real motive was "with any degree of clarity or certainty".
1454_82
2017 22 March 2017: At around 14:40 GMT, Briton Khalid Masood, drove a car into pedestrians on Westminster Bridge before crashing the car into the perimeter fence of the British Parliament in Westminster London. Masood then exited the vehicle and stabbed a police officer before being shot dead by police. About 40 people were injured and there were six deaths (including the police officer and Masood). 3 June 2017: a van with three attackers inside was driven into pedestrians on London Bridge at 21:58 GMT. After exiting the vehicle, the attackers stabbed people in pubs and restaurants in nearby Borough Market before being shot dead by police at 22:16. Eleven people, including the three attackers, were killed and 48 people were injured.
1454_83
19 June 2017: a van was driven into people walking near Finsbury Park Mosque in London after tarawih prayers. There were eleven injuries and one person died, although whether this victim died from the attack is unclear. The police declared the incident a terrorist attack. 25 August 2017: A car driver was arrested by police outside Buckingham Palace. The suspect reached for a sword while seated inside his car when officers challenged him. He was charged with intent to commit an act of terrorism. Two police received minor injuries making the arrest. 15 September 2017: a homemade bomb partially detonated on a tube train at Parsons Green tube station at 08:20 BST (UTC+1). Twenty-two were injured, including eighteen who were hospitalised.
1454_84
2018 14 August 2018, 2018 Westminster car attack: A Ford Fiesta swerved into pedestrians outside the palace of Westminster. The car then crossed over a traffic island before crashing into a security barrier. 2019 29 November 2019, London Bridge stabbing: Police shot dead a suspect, wearing a suspected fake suicide vest, after five people were injured in a stabbing incident near London Bridge. Three people were confirmed as having been killed, including the suspect. 2020 2 February 2020, Streatham stabbing: Two people were stabbed before police shot the suspect, Sudesh Amman, dead. See also Attacks on the London Underground List of terrorist incidents in Great Britain List of terrorist incidents (Worldwide) References and notes Terrorism London Terrorist incidents in London Terrorist incidents in London
1455_0
Antonia Pia Anna Göransson (born 16 September 1990) is a Swedish former footballer who played as a winger. A product of Malmö FF's youth system, Göransson began her Damallsvenskan career with Kristianstads DFF in 2008. She moved to Germany in 2010, with SV Hamburg, before joining Turbine Potsdam a year later. After making her debut for the senior Sweden women's national football team in October 2010, Göransson represented her country at the 2011 FIFA Women's World Cup, the 2012 London Olympics and the 2013 UEFA Women's Championship. A fast and skilful winger, Göransson can strike the ball equally well with either foot. Club career
1455_1
Early career Born in Stockholm, Göransson moved to Sjöbo aged three, then Boden aged seven. She played for various clubs in this period before signing for Malmö FF at youth level when the family returned to Skåne County in 2006. At Malmö Göransson came under the influence of youth coach Lena Videkull, whom she credited for a rapid improvement in all aspects of her game. Göransson was sent on loan to Malmö's lower division nursery club Husie IF. She also spent part of the 2007–2008 season on loan to BK Skjold in Copenhagen, scoring three goals in the Danish Elitedivisionen.
1455_2
Kristianstads DFF In summer 2008, Göransson quit Malmö for a low-key transfer to their Damallsvenskan rivals Kristianstads DFF. After adjusting to first team football in the remainder of the 2008 season, Göransson flourished under the leadership of KDFF's Icelandic coach Elísabet Gunnarsdóttir in 2009. She became an important part of the team, scoring five goals in 19 league matches and winning the Swedish Football Association's Rookie of the Year award. Ambitious 18-year-old Göransson informed Kristianstads that the chances of her remaining at the club for another season were 50:50. In 2010, she played 16 matches and scored three league goals for Kristianstads, before accepting a professional contract offer from SV Hamburg in August 2010.
1455_3
Germany Göransson performed well in 2010–11, her first season in the Frauen-Bundesliga, scoring six goals in her 17 appearances. Hamburg were keen to extend the initial one-year contract she had signed. Instead Göransson accepted a competing offer from Frauen-Bundesliga champions Turbine Potsdam, signing a two-year contract.
1455_4
Back to Sweden In June 2014 Göransson left Turbine Potsdam and returned to Sweden to join Vittsjö GIK. She signed a contract until the end of the 2015 season. American National Women's Soccer League club Seattle Reign FC announced in November 2015 that they had signed Göransson for their 2016 season. Weeks before she was due to leave for the United States, Göransson was diagnosed with Type 1 Diabetes. She travelled to Seattle against medical advice, but returned to Sweden after only a short period with the team, during which she had felt unwell and stressed. She signed for Mallbackens IF and was more settled living in a small town in a quiet area, closer to her family and support network.
1455_5
Norway and Italy Göransson signed for Norwegian Toppserien club Kolbotn Fotball in February 2017. In spring 2017 she played 12 times for Kolbotn, including 10 league games, and scored one goal. Her good form brought her to the attention of other clubs and in July 2017 she agreed a two-year contract with Fiorentina, reigning champions of the Italian Serie A. She made one appearance for the team against AGSM Verona, being substituted after 57 minutes, then was released from her contract in December 2017.
1455_6
Retirement Bayer 04 Leverkusen signed Göransson to a two-year contract in September 2019.
1455_7
She was yet again coached by Achim Fiefel. Fiefel coached Göransson in Hamburg in 2010. She has always praised the german training culture. Leverkusen has according to Göransson a very profesional environment. Although she didnt get too many minutes under the belt in bundesliga she developed every training session. She was the best she had ever been in the training sessions, but unfortunately she didnt (according to herself) play as well as she did in training when she got minutes in bundesliga. This was a real shame. The coach praised her performance several periods during 2019-20 as she was outstanding in training. But like Göransson herself said. It was unfortunate that she didnt reach the same level in bundesliga. Fiefel is one of her absolute favorite coaches. She wanted to win back her place in the national team ahead of the 2020 Olympics. She returned to Sweden in August 2020, joining Växjö where she played once in the Damallsvenskan and once in the Svenska Cupen Damer. She
1455_8
decided to end her football career before the 2021 Damallsvenskan season.
1455_9
International career As a Swedish under-19 international, Göransson played in the 2009 U-19 European Championship in Belarus, where Sweden lost 2–0 in the final to England. At the 2010 U-20 World Cup in Germany, Göransson was surprised to be utilised as a makeshift striker. She scored four goals in four games as Sweden were beaten 2–0 by Colombia in the quarter-final. In February 2010, Göransson and Emilia Appelqvist were called up to train with the senior national team for the Algarve Cup. Göransson was named in the senior national team squad for the first time in March 2010, replacing the injured Kosovare Asllani for a 2011 FIFA Women's World Cup qualifier in Wales. She made her first senior appearance in October 2010; a 3–1 friendly win over longstanding rivals Norway in Falkenberg.
1455_10
Quotes attributed to Göransson in local newspapers strongly criticised national team coach Thomas Dennerby for leaving her out of the national team. But she later distanced herself from the remarks, stressing that her relationship with Dennerby was good. Angry Dennerby wrote an open letter, criticising state broadcaster Sveriges Television for unethically taking Göransson's quotes out of context. When she was named in Dennerby's squad for the 2011 FIFA Women's World Cup in Germany, delighted Göransson said she had dreamed of the opportunity since she was 12 years old. She featured as a substitute in Sweden's 3–1 semi-final defeat to eventual winners Japan in Frankfurt. Sweden secured third place by beating France 2–1 in Sinsheim, although Göransson did not play.
1455_11
Third place in the World Cup secured Sweden's qualification for the 2012 Olympic football tournament in London. Dennerby kept Göransson in Sweden's Olympic squad for London, and she made a substitute appearance in Sweden's 2–1 defeat by France in the quarter-final at Hampden Park. In June 2013, incoming coach Pia Sundhage named Göransson in the squad for UEFA Women's Euro 2013, which Sweden hosted. When the Swedes lost 1–0 to Germany in the semi-final, disappointed Göransson was glad that the team had managed to raise the profile of women's football in Sweden.
1455_12
In September 2013 Sundhage tried Göransson in the left back position during Sweden's 2015 FIFA Women's World Cup qualification matches. Göransson responded positively to the experiment. Sundhage dropped Göransson from the national squad for an important qualifier against Scotland because she was not playing often enough at club level for Turbine Potsdam. Although Göransson found regular first-team football with Vittsjö and returned to the national squad for the 2015 Algarve Cup, Playing style Göransson can play equally well with either foot. She describes her left foot as more powerful and her right foot as more accurate. An editorial in the Dagens Nyheter newspaper published during the 2011 FIFA Women's World Cup called for Göransson to be included in the national team's starting line-up, praising her pace, power and technique.
1455_13
Göransson has been honoured twice at 2 indoor tournaments with Turbine Potsdam. In 2013 and in 2014. In 2013, when the tournament was held in Magdeburg, she was chosen into a "Hall of Fame" in Germany along stars like Birgitt Prinz, Alexandra Popp after being awarded the title of "best player of the tournament", at the same tournament, she also won the Golden Boot award for scoring most goals, 6. In 2014, she was also named the best player of the tournament for an indoor football tournament hosted by Turbine Potsdam . This was a special moment for her since it was awarded based on votes by the coaches of all the teams. Göransson also won the golden boot award for this tournament. Honours Club Turbine Potsdam Frauen-Bundesliga (1): 2011–12 International Sweden FIFA Women's World Cup Third place: 2011 Olympics 2012 Third place EM Sweden 2013 Individual Best Swedish New Talent in 2010 Chosen into Hall of fame at DFB Hallenpokal in Magdeburg in 2013.
1455_14
Chosen into hall of fame, at Turbine Potsdam's International indoor tournament in 2014. Guldkepsen Winner, Kristianstad 2010. 50 Caps for Sweden achieved in 2015. References External links Framba.de profile
1455_15
Swedish women's footballers 1990 births Living people Sweden women's international footballers Hamburger SV (women) players 1. FFC Turbine Potsdam players 2011 FIFA Women's World Cup players Footballers at the 2012 Summer Olympics Olympic footballers of Sweden Kristianstads DFF players Damallsvenskan players Swedish expatriate footballers Swedish expatriate sportspeople in Germany Expatriate women's footballers in Germany Vittsjö GIK players Mallbackens IF players OL Reign players Swedish expatriate sportspeople in Italy Swedish expatriate sportspeople in Norway Expatriate women's footballers in Italy Fiorentina Women's F.C. players Serie A (women's football) players Expatriate women's footballers in Norway Kolbotn Fotball players Toppserien players Women's association football midfielders Bayer 04 Leverkusen (women) players Växjö DFF players Frauen-Bundesliga players
1456_0
The curse of Ham is described in the Book of Genesis as imposed by the patriarch Noah upon Ham's son Canaan. It occurs in the context of Noah's drunkenness and is provoked by a shameful act perpetrated by Noah's son Ham, who "saw the nakedness of his father". The exact nature of Ham's transgression and the reason Noah cursed Canaan when Ham had sinned have been debated for over 2,000 years. The story's original purpose may have been to justify the subjection of the Canaanites to the Israelites, but in later centuries, the narrative was interpreted by some Christians, Muslims and Jews as an explanation for black skin, as well as a justification for slavery of black people. Similarly, the Latter Day Saint movement used the curse of Ham to prevent the ordination of black men to its priesthood. Nevertheless, most Christians, Muslims, and Jews now disagree with such interpretations, because in the biblical text, Ham himself is not cursed, and race or skin color is never mentioned.
1456_1
Biblical narrative The concept of the curse of Ham finds its origins in Genesis 9: The objective of the story may have been to justify the subject status of the Canaanites, the descendants of Ham, to the Israelites, the descendants of Shem. The narrative of the curse is replete with difficulties. It is uncertain what the precise nature of Ham's offense is. Verse 22 has been a subject of debate, as to whether it should be taken literally, or as "a euphemism for some act of gross immorality". In verse 25, Noah refers to Shem and Japheth as the "brethren" of Canaan, whereas in verse 18 they are identified as his uncles. The Table of Nations presents Canaan and Mizraim (Egypt) among the sons of Ham (10:6). In the Psalms, Egypt is equated with Ham.
1456_2
The treatment of Japheth in verses 26–27 raises questions: Why is YHWH named as the God of Shem, but not of Japheth? What does it mean that God will "enlarge" Japheth? And why will Japheth "dwell in the tents of Shem"? Further difficulties include Ham's being referred to as "the youngest son", when all other lists make him Noah's second son. Biblical scholar Nahum Sarna says that the biggest challenge of the narrative is why Canaan was cursed, rather than Ham, and that the concealed details of the shameful incident bear the same reticence as Reuben's sexual transgression.
1456_3
The narrative's short five verses indicate that Canaan's Hamite paternity must have had great significance to the narrator or redactor, according to Sarna, who adds, "The curse on Canaan, invoked in response to an act of moral depravity, is the first intimation of the theme of the corruption of the Canaanites, which is given as the justification for their being dispossessed of their land and for the transfer of that land to the descendants of Abraham." Ham's transgression
1456_4
Seeing Noah's nakedness The majority of commentators, both ancient and modern, have felt that Ham's seeing his father naked was not a sufficiently serious crime to explain the punishment that follows. Nevertheless, Genesis 9:23, where Shem and Japheth cover Noah with a cloak while averting their eyes, suggests that the act of "seeing (Noah's) nakedness" is to be taken literally, and it has recently been pointed out that, in first millennium Babylonia, looking at another person's genitals was indeed regarded as a serious matter.
1456_5
Other ancient commentators suggested that Ham was guilty of more than what the Bible says. The 2nd century Targum Onqelos has Ham gossiping about his father's drunken disgrace "in the street" (a reading which has a basis in the original Hebrew), so that being held up to public mockery was what had angered Noah; as the Cave of Treasures (late 6th – early 7th century) puts it, "Ham laughed at his father's shame and did not cover it, but laughed about it and mocked."
1456_6
Ancient commentaries have also debated whether "seeing" someone's nakedness meant to have sex with that person (e.g., Leviticus 20:17). The same idea was raised by third-century rabbis, in the Babylonian Talmud (c. 500 AD), who argue that Ham either castrated his father, or sodomised him. The same explanations are found in three Greek translations of the Bible, which replace the word "see" in verse 22 with another word denoting homosexual relations. The castration theory has its modern counterpart in suggested parallels found in the castration of Uranus by Cronus in Greek mythology and a Hittite myth of the supreme god Anu whose genitals were "bitten off by his rebel son and cup-bearer Kumarbi, who afterwards rejoiced and laughed ... until Anu cursed him".
1456_7
Some modern scholars, such as Bergsma and Hahn, have suggested that Ham engaged in intercourse with his mother, Noah's wife. Support for this theory can be found in verses such as Leviticus 20:11: "And the man that lieth with his father's wife hath uncovered his father's nakedness". According to this interpretation of the story, Canaan was the offspring of the illicit union between Ham and his mother, which accounts for the curse falling upon Canaan rather than Ham.
1456_8
Book of Jubilees In the Book of Jubilees, the seriousness of Ham's curse is compounded by the significance of God's covenant to "never again bring a flood on the earth". In response to this covenant, Noah builds a sacrificial altar "to atone for the land".[Jub. 6:1–3] Noah’s practice and ceremonial functions parallel the festival of Shavuot as if it were a prototype to the celebration of the giving of the Torah. His priestly functions also emulate being "first priest" in accordance with halakhah as taught in the Qumranic works. By turning the drinking of the wine into a religious ceremony, Jubilees alleviates any misgivings that may be provoked by the episode of Noah's drunkenness. Thus, Ham's offense would constitute an act of disrespect not only to his father, but also to the festival ordinances.
1456_9
Medieval Judaism The medieval commentator Rashi (1040–1105), writes of Ham's offence against Noah: "There are those of our rabbis who say he emasculated [or castrated סרסו] him, and there are those who say he had [homosexual רבעו] relations with him." Rashi cites Sanhedrin 70a, which adds that those who believe that Ham had homosexual relations with his father agree that he also emasculated him. Rashi continues: "What did Ham see that he emasculated him? He said to his brothers: Adam the first man had two sons, yet one killed the other because of the inheritance of the world [Cain killed Abel over a dispute how to divide the world between them according to Genesis Rabbah 22:7], and our father has three sons yet he seeks still a fourth son."
1456_10
Curse of Canaan Genesis 9:25: "And he said, Cursed be Canaan; a servant of servants shall he be unto his brethren" It is noteworthy that the curse was made by Noah, not by God. Some biblical scholars claim that when a curse is made by a man, it could only have been effective if God supports it, unlike the curse of Ham and his descendants, which was not confirmed by God or, at least, it is not mentioned in the Bible that he had confirmed it. Dead Sea Scrolls 4Q252, a pesher (interpretation) on the Book of Genesis found among the Dead Sea Scrolls, explains that since Ham had already been blessed by God (Genesis 9:1), he could not now be cursed by Noah. The 4Q252 scroll probably dates from the later half of the first century BC. A century later, the Jewish historian Josephus argued that Noah refrained from cursing Ham because of his nearness of kin, and so cursed Ham's son instead.
1456_11
A new alternative interpretation of 4Q181, which is a Dead Sea scroll of Genesis, parallels the Book of Jubilees, suggesting that Canaan was cursed because he defied Noah’s division of the land. Jubilees The Book of Jubilees also recounts the incident between Ham and Noah, and Noah's resulting curse against Canaan, in similar terms. Later, however, Jubilees explains further that Noah had allocated Canaan a land west of the Nile along with his brothers, but that he violated this agreement and instead chose to squat in the land delineated to Shem (and later Abraham), and so rightly deserved the curse of slavery.
1456_12
Classical Judaism Philo of Alexandria, a 1st-century BC Jewish philosopher, said that Ham and Canaan were equally guilty, if not of whatever had been done to Noah, then of other crimes, "for the two of them together had acted foolishly and wrongly and committed other sins." Rabbi Eleazar decided that Canaan had in fact been the first to see Noah, and had then gone and told his father, who then told his brothers in the street; this, said Eleazar, "did not take to mind the commandment to honour one's father." Another interpretation was that Noah's "youngest son" could not be Ham, who was the middle son: "for this reason they say that this youngest son was in fact Canaan." According to Rashi, Ham castrated Noah and prevented him from having a fourth son; therefore, Noah cursed Ham's own fourth son, Canaan.
1456_13
While the episode about Ham and his father Noah displays like a banner the actions of the fathers unto the shame of their sons, the codifiers of Jewish law assert that a Canaanite slave is obligated to perform certain mitzvot, just as Jewish women do, making him of a higher rank than ordinary gentiles when there is a question on whose life should be saved first. Moreover, according to the Hebrew Bible (Exo. 21:26ff.), whenever a Canaanite slave is set free from his yoke by losing either a tooth or an eye, or one of twenty-four chief limbs in a man's body that cannot be replaced, where the Torah says of him, “he shall set him free,” according to the exponents of Jewish law, the sense here is that the same emancipated slave becomes a "freeborn" (benei ḥorīn) and is received in the Jewish fold and is permitted to marry a daughter of Israel. However, his emancipation must be followed by a written bill of manumission (sheṭar shiḥrūr) by the rabbinic court of Israel. Hence: a Canaanite
1456_14
slave's bondage was meant to elevate himself at a later juncture in life, although his Master in ordinary circumstances is under no constraints to set him free, unless he were physically and openly maimed.
1456_15
The rules governing a Canaanite slave are used generically, and may apply to any non-Jew (gentile) held in bondage by an Israelite. According to Rashi, citing an earlier Talmudic source, the heathen were never included in the sanction of possessing slaves as the children of Israel were permitted to do, for the Scripture says (Leviticus 25:44): "Of them you shall buy, etc.", meaning, "Israel alone is permitted to buy from them [enslaved persons], but they are not permitted to buy [enslaved persons] from you, nor from one another." Racism and slavery In the past, some people claimed that the curse of Ham was a biblical justification for imposing slavery and racial discrimination towards black people, although this concept has been criticized for being an ideologically driven misconception. Regarding this matter, the Christian leader Martin Luther King Jr. called such an attempt a "blasphemy" that "is against everything that the Christian religion stands for."
1456_16
For Southern slave owners who were faced with the abolitionist movement to end slavery, the curse of Ham was one of the many grounds upon which Christian planters could formulate an ideological defense of slavery. Even before slavery, in order to promote economic motivations within Europe associated with colonialism, the curse of Ham was used to shift the common Aristotelian belief that phenotypic differentiation among humans was a result of climatic difference, to a racialist perspective that phenotypic differentiation among the species was due to there being different racial types. This often came as a result of European anxieties to avoid being sent to the colonies, as they were terrified of the high casualty rate of settlers due to disease and warfare. Thus, many of them formulated the idea that being sent south of the equator "blackened" them and thus made them inferior.
1456_17
In the 15th century, Dominican friar Annius of Viterbo invoked the Curse of Ham to explain the differences between Europeans and Africans in his writings. Annius, who frequently wrote of the "superiority of Christians over the Saracens", claimed that due to the curse imposed upon black people, they would inevitably remain permanently subjugated by Arabs and other Muslims. He wrote that the fact that so many Africans had been enslaved by the heretical Muslims was supposed proof of their inferiority. Through these and other writings, European writers established a hitherto unheard of connection between Ham, Africa and slavery, which laid the ideological groundwork for justifying the transatlantic slave trade.
1456_18
The historian David Whitford writes of a “curse matrix” which was derived from the vagueness of Genesis 9 and interpreted by racialists to mean that it mattered not who was cursed or which specific group of people the curse originated with, all that mattering being that there was a vague reference to a generational curse that could be exploited by those seeking to justify their actions against black people, such as Southern slaveowners.
1456_19
Pro-slavery intellectuals were hard-pressed to find any justification for slavery and racism within Christian theology which taught that all humans were descendants of Adam and therefore one race, possessed with equal salvation potential and deserving to be treated as kin. The curse of Ham was used to drive a wedge in the mythology of a single human race, as elite intellectuals were able to convince people that the three sons of Noah represented the three sects of Man and their respective hierarchy of different fates. Leading intellectuals in the south, like Benjamin M. Palmer, claimed that white Europeans were descended from Japhet who was prophesied by Noah to cultivate civilization and the powers of the intellect, while Africans, being descendants of the cursed Ham, were destined to be possessed by a slavish nature ruled by base appetites. Early Judaism and Islam
1456_20
While Genesis 9 never says that Ham was black, he became associated with black skin, through folk etymology deriving his name from a similar, but actually unconnected, word meaning "dark" or "brown". The next stage are certain fables according to ancient Jewish traditions. According to one legend preserved in the Babylonian Talmud, God cursed Ham because he broke a prohibition on sex aboard the ark and "was smitten in his skin"; according to another, Noah cursed him because he castrated his father. Although the Talmud refers only to Ham, the version brought in a midrash goes on further to say "Ham, that Cush came from him" in reference to the blackness, that the curse did not apply to all of Ham but only to his eldest son Cush, who migrated to sub-Sahara Africa. Thus, two distinct traditions existed, one explaining dark skin as the result of a curse on Ham, the other explaining slavery by the separate curse on Canaan.
1456_21
The concepts were introduced into Islam during the Arab expansion of the 7th century, due to cross-pollination of Jewish and Christian parables and theology into Islam, called "Isra'iliyyat". Some medieval Muslim writersincluding Muhammad ibn Jarir al-Tabari, Ibn Khaldun, and even the later Book of the Zanjasserted the view that old biblical texts describe the effects of Noah's curse on Ham's descendants as being related with blackness, slavery, and a requirement not to let the hair grow past the ears. The account of the drunkenness of Noah and curse of Ham are not present within the text of the Quran, the Islamic holy book, as it is not consistent with Islamic teachings, since Noah is a prophet, and prophets do not drink alcohol. Islam holds prophets of God in very high esteem, and some Muslims suggest the prophets are infallible.
1456_22
Historically, other Muslim scholars such as Ahmad Baba al-Timbukti criticised the Curse of Ham narrative and went on to criticise the association of black Africans with slaves. Others, such as Ibn Kathir, more broadly criticised the Isra'iliyyat tradition, and avoided using such reports when explaining verses of the Quran. As for the Islamic tradition itself, in the Farewell Sermon, the Prophet Muhammad said: "O people, your Lord is one and your father [Adam] is one. There is no superiority of an Arab over a non-Arab, nor a non-Arab over an Arab; no superiority of a white person over a black person, nor superiority of a black person over a white person – except through mindfulness of God." Medieval serfdom and "Pseudo-Berossus" In medieval Christian exegesis, Ham's sin was regarded as laughter (for mocking his father and doing nothing to rectify his condition).
1456_23
Elsewhere in Medieval Europe, the curse of Ham also became used as a justification for serfdom. Honorius Augustodunensis (c. 1100) was the first recorded to propose a caste system associating Ham with serfdom, writing that serfs were descended from Ham, nobles from Japheth, and free men from Shem. However, he also followed the interpretation of 1 Corinthians 7:21 by Ambrosiaster (late 4th century), which held that as servants in the temporal world, these "Hamites" were likely to receive a far greater reward in the next world than would the Japhetic nobility.
1456_24
The idea that serfs were the descendants of Ham soon became widely promoted in Europe. An example is Dame Juliana Berners (c. 1388), who, in a treatise on hawks, claimed that the "churlish" descendants of Ham had settled in Europe, those of the temperate Shem in Africa, and those of the noble Japheth in Asia (a departure from normal arrangements, which placed Shem in Asia, Japheth in Europe, and Ham in Africa), because she considered Europe to be the "country of churls", Asia of gentility, and Africa of temperance. As serfdom waned in the late medieval era, the interpretation of serfs being descendants of Ham decreased as well.
1456_25
Ham also figured in an immensely influential work Commentaria super opera diversorum auctorum de antiquitatibus (Commentaries on the Works of Various Authors Discussing Antiquity). In 1498, Annius of Viterbo claimed to have translated records of Berossus, an ancient Babylonian priest and scholar; which are today usually considered an elaborate forgery. However, they gained great influence over Renaissance ways of thinking about population and migration, filling a historical gap following the biblical account of the flood. According to this account, Ham studied the evil arts that had been practiced before the flood, and thus became known as "Cam Esenus" (Ham the Licentious), as well as the original Zoroaster and Saturn (Cronus).
1456_26
He became jealous of Noah's additional children born after the deluge, and began to view his father with enmity, and one day, when Noah lay drunk and naked in his tent, Ham saw him and sang a mocking incantation that rendered Noah temporarily sterile, as if castrated. This account contains several other parallels connecting Ham with Greek myths of the castration of Uranus by Cronus, as well as Italian legends of Saturn and/or Camesis ruling over the Golden Age and fighting the Titanomachy. Ham in this version also abandoned his wife who had been aboard the ark and had mothered the African peoples, and instead married his sister Rhea, daughter of Noah, producing a race of giants in Sicily.
1456_27
American/European slavery, seventeenth and eighteenth centuries The explanation that black Africans, as the "sons of Ham", were cursed, possibly "blackened" by their sins, was sporadically advanced during the Middle Ages, but its acceptance became increasingly common during the slave trade of the eighteenth and nineteenth centuries. The justification of slavery itself through the sins of Ham was well suited to the ideological interests of the elite; with the emergence of the slave trade, its racialized version justified the exploitation of African labour.
1456_28
In the parts of Africa where Christianity flourished in its early days, while it was still illegal in Rome, this idea never took hold, and its interpretation of scripture was never adopted by the African Coptic Churches. A modern Amharic commentary on Genesis notes the nineteenth century and earlier European theory that blacks were subject to whites as a result of the curse of Ham, but calls this a false teaching unsupported by the text of the Bible, emphatically pointing out that Noah's curse did not fall upon all descendants of Ham, but only on the descendants of Canaan, and asserting that it was fulfilled when Canaan was occupied by both Semites (Israel) and Japhetites. The commentary further notes that Canaanites ceased to exist politically after the Third Punic War (149 BC), and their current descendants are thus unknown and scattered among all peoples.
1456_29
The Anglo-Irish scientist Robert Boylea seventeenth-century polymath who was also a theologian and a devout Christianrefuted the idea that blackness was caused by the curse of Ham, in his book Experiments and Considerations Touching Colours (1664). There, Boyle explains that the curse of Ham as an explanation for the complexion of coloured people was but a misinterpretation that was embraced by "vulgar writers", travelers, critics, and also "men of note" of his time. In his work, he challenges that vision, explaining:
1456_30
A number of other scholars also support the claim that the racialized version of the curse of Ham was devised at that time because it suited ideological and economical interests of the European elite and slave traders who wanted to justify exploitation of African labour. While Robinson (2007) claims that such version was non-existent before, historian David Brion Davis argues, as well, that contrary to the claims of many reputable historians, neither the Talmud nor any early post-biblical Jewish writing relates blackness of the skin to a curse whatsoever. Abyssinia In what is now Ethiopia, the Abyssinian Church justified slavery with its version of the Curse of Ham. Latter Day Saint movement
1456_31
In 1835, Joseph Smith, the founder of the Latter Day Saint movement, published a work which was titled the Book of Abraham. It explicitly denotes that an Egyptian king who is referred to by the name of Pharaoh was a descendant of Ham and the Canaanites, who were black (), that Noah had cursed his lineage so they did not have the right to the priesthood, and that all Egyptians descended from him.
1456_32
It was later considered scripture by The Church of Jesus Christ of Latter-day Saints (LDS Church). This passage is the only one which is found in any Mormon scripture that bars a particular lineage of people from holding the priesthood, and, while nothing in the Book of Abraham explicitly denotes that Noah's curse was the same curse which is mentioned in the Bible or that the Egyptians were related to other black Africans, it later became the foundation of church policy with regard to the priesthood ban. The 2002 edition of the Doctrine and Covenants Student Manual points to Abraham 1:21–27 as the reason why black men were not given the priesthood until 1978.
1456_33
In 1836, Smith taught that the curse of Ham came from God, and it stated that blacks were cursed with servitude. He warned those who tried to interfere with slavery that God could do his own work. However, in contrast to this, in 1835 Smith published a revelation received in 1833 in which the Lord states, referring to slavery, "it is not right that any man should be in bondage one to another". Smith started expressing more anti-slavery positions starting in 1842. In 1844, when Smith ran for president of the United States, he advocated for the abolition of slavery by the year 1850.
1456_34
After Smith's death, Brigham Young, the next leader of the LDS Church, maintained that black Africans were under the curse of Ham and that those who tried to abolish slavery were going against the decrees of God, although the day would come when the curse would be nullified through the saving powers of Jesus Christ. In addition, based on his interpretation of the Book of Abraham, Young believed that, as a result of this curse, negroes were banned from the Mormon priesthood. In 1978, LDS Church president Spencer W. Kimball said he received a revelation that extended the priesthood to all worthy male members of the church without regard to race or color. In 2013, the LDS Church denounced the curse of Ham explanation for withholding the priesthood from black Africans. See also Afrikaner Calvinism Curse and mark of Cain Hamitic Lot's daughters References Citations Bibliography External links
1456_35
Book of Genesis Criticism of Judaism Curses Ham (son of Noah) Historical definitions of race History of The Church of Jesus Christ of Latter-day Saints Religion and race Slavery and religion Noach (parashah) Book of Jubilees
1457_0
Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy. By contrast, software that causes harm due to some deficiency is typically described as a software bug. Malware poses serious problems to individuals and businesses. According to Symantec’s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.
1457_1
Many types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper, and scareware. The defense strategies against malware differs according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches to reduce zero-day attacks, securing networks from intrusion, having regular backups and isolating infected systems. Malware is now being designed to evade antivirus software detection algorithms. History
1457_2
The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.
1457_3
Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.
1457_4
Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 92% of malware delivery around the world. The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.
1457_5
With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code. Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate.
1457_6
Purposes Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords. Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.
1457_7
Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities. Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.
1457_8
Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent. In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012). Types These categories are not mutually exclusive, so malware may use multiple techniques.
1457_9
Trojan horse A Trojan horse is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.
1457_10
Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.
1457_11
Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves. In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults. Rootkits Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.
1457_12
Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Backdoors A backdoor is a method of bypassing normal authentication procedures, usually over a connection to a network such as the Internet. Once a system has been compromised, one or more backdoors may be installed in order to allow access in the future, invisibly to the user.
1457_13
The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods. Infectious Malware The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any specific types of behavior and have been likened to biological viruses.
1457_14
Worm A worm is a stand-alone malware software that transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself. Virus A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.
1457_15
Ransomware Screen-locking ransomware Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee. Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections. Encryption-based ransomware Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry. Grayware
1457_16
Grayware (sometimes spelled as greyware) is a term, coming into use around 2004, that applies to any unwanted application or file that can worsen the performance of computers and may cause security risks but which is not typically considered malware. Greyware are applications that behave in an annoying or undesirable manner, and yet are less serious or troublesome than malware. Grayware encompasses spyware, adware, fraudulent dialers, joke programs ("jokeware"), remote access tools and other unwanted programs that may harm the performance of computers or cause inconvenience. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying.
1457_17
Potentially Unwanted Program (PUP) Potentially unwanted programs (PUPs) or potentially unwanted applications (PUAs) are applications that would be considered unwanted despite being downloaded often by the user, possibly after failing to read a download agreement. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as grayware, although they frequently carry true malware in addition to their ostensible purpose. Malwarebytes lists several criteria for classifying a program as a PUP. Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available.
1457_18
Evasion Since the beginning of 2015, a sizable portion of malware has been utilizing a combination of many techniques designed to avoid detection and analysis. From the more common, to the least common: evasion of analysis and detection by fingerprinting the environment when executed. confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware. timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time. obfuscating internal data so that automated tools do not detect the malware. An increasingly common technique (2015) is adware that uses stolen certificates to disable anti-malware and virus protection; technical remedies are available to deal with the adware.
1457_19
Nowadays, one of the most sophisticated and stealthy ways of evasion is to use information hiding techniques, namely stegomalware. A survey on stegomalware was published by Cabaj et al. in 2018. Another type of evasion technique is Fileless malware or Advanced Volatile Threats (AVTs). Fileless malware does not require a file to operate. It runs within memory and utilizes existing system tools to carry out malicious acts. Because there are no files on the system, there are no executable files for antivirus and forensic tools to analyze, making such malware nearly impossible to detect. The only way to detect fileless malware is to catch it operating in real time. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits. Risks
1457_20
Vulnerable software
1457_21
A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this
1457_22
payload is accessed it does what the attacker, not the legitimate software, determines.
1457_23
Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network.
1457_24
Excessive privileges Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.
1457_25
Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.
1457_26
Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user.
1457_27
Weak passwords A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account.
1457_28
Use of the same operating system Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them. Mitigation
1457_29
Antivirus / Anti-malware software Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.