How to Beat PC Viruses

Futurist Keynote Speaker: Posts, Slides, Videos - Technology Futurist, AI, Big Data, Robotics, Cyber


Yet another mutant of the infamous love bug is now unleashed, even more dangerous than the one before. This one changes its name each time it is opened, and then resends to everyone in an Outlook address book, before severely damaging your hard disk.

Since most of these viruses have a common weakness, this is what you should do IMMEDIATELY:

  • Always be suspicions of any attachment - whoever it appears to be from. These viruses send messages that appear to be from someone who has mailed you in the past. (In any case, good practice is to ban transmission of all non-essential attachments. It's so last century. Life's too short to open them when in most cases the same can be sent as standard e-mail text, and attachments are slow to transmit especially to personal devices while on the move, also impossible to view without the right version of the right software. Really bulky graphics files should be put on the web with a link in the e-mail).
  • Always look carefully NOT at the name of the attachment, but at the bit at the end of the name - after the last '.' eg whether the name ends with .ppt4 (powerpoint) or .doc (Word) etc. Attachments such as the latest love bug mutations are written in Visual Basic computer language hence the .vbs at the end. .exe is also very dangerous since this is also always going to be some kind of programme.
  • Update your virus software online.

These three simple steps will dramatically reduce vulnerability to the current batch of viruses.

McAfee has a brilliant virus library

For more see below on latest mutation from

Name: VBS/NewLove-A

Aliases: VBS/Loveletter.ed, VBS/Loveletter.Gen, VBS_SPAMMER,

VBS.Loveletter.FW.A, NEWLOVE.A, VBS/Spammer.A,

VBS.Loveletter.FW, Spammer, Newlove

Type: Visual Basic Script worm

Sophos and the FBI issued an alert on 19 May 2000 about a new polymorphic email-aware worm which has been reported in the wild. The worm, called VBS/NewLove-A is a Visual Basic Script virus that mutates its appearance in an attempt to avoid detection by anti-virus products.

If you are infected it will chooses a random filename and attempts to forward a mutated version of itself to everybody in your Microsoft Outlook address book. The name of the file it forwards is determined by randomly choosing one of the filenames in your Windows\Recent folder, appended with ".Vbs" (eg EXPENSES.XLS becomes EXPENSES.XLS.Vbs). The filename attached will have one of the following extensions: Doc.Vbs Xls.Vbs Mdb.Vbs Bmp.Vbs Mp3.Vbs Txt.Vbs Jpg.Vbs Gif.Vbs Mov.Vbs Url.Vbs Htm.Vbs The message has the subject line: "FW: <filename>" where filename is name of the file it is forwarding, with the extension ".Vbs" removed. So, if the attached infected file is README.DOC.Vbs then the subject line will be "FW: README.DOC". Because of this VBS/NewLove-A does not use the same filename or subject line on different infections. The email message has no message text. The virus attempts to reduce all files on local and remote drives to zero. This means that Windows may stop working correctly, and that your system will not start up properly upon reboot.

Users who have disabled Windows Scripting Host (WSH) on their computers will not be infected by this virus. Details on how to disable WSH are published at:

Users who are blocking any Visual Basic Script filename (the infected message always arrives with end suffix of ".Vbs" on the filename) will not be affected. Due to the way in which the virus mutates, it rapidly increases in size on each infection. This means that your mail server may become increasingly slowed down by larger and larger amounts of email.

Sophos researchers are working on a method of detecting this virus, and will be issuing an update.

Related news items:
Newer news items:
Older news items:

Thanks for promoting with Facebook LIKE or Tweet. Really interested to read your views. Post below.

Join the Debate! What are your own views?



Our cookie policy

We use cookies for statistical purposes. To comply with the e-Privacy Directive we need to ask your consent to place these cookies on your computer.

Your use of this site indicates acceptance of these terms. I accept