Comodo Uncovers New Evidence Computer Viruses Originate From Radiation Emitted by Black Holes

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<strong>Jersey City, N.J. &mdash; April 1</strong><br />In a startling discovery, Comodo scientists uncovered a new missing link into the source of particularly virulent group of computer viruses called Ze Lo Emes. Based on an analysis of millions of data points, the emergence of these computer viruses can now be linked to super massive black holes in this galaxy that leave behind long-lasting infrared radiation that mutate into viruses affecting core PC functions. The findings conclude that the ultra-high energy released by black holes transforms the binary code of running processes, literally changing zeroes to ones, causing affected computers to irreparably crash or lose data.<br /><br />Most industry experts routinely attribute viruses and Trojan horses to hackers and basement-inhabiting script kiddies. However, this new evidence provides controversial evidence that the radiation causing viruses has spread quickly in the past few years as a direct correlation to the depletion of the Ozone layer. "It&#39;s an amazing process of code mutation," observed Robert Williams, executive director for the International Black Hole Radiation Institute in Brussels. "The radiation actually gets into users&#39; computers and changes the binary code in the computer program. What&#39;s more, it&#39;s almost impossible to block. It originates over 4 million light years away and officially qualifies as the most remote exploit we&#39;ve ever seen."<br /><br />Comodo scientists centered their research on the afterglow from black holes that releases energy in the form of radiation waves, causing this form of computer virus. The persistent auras originate from the thick clouds of gas and dust, called accretion discs, which surround and sustain the black holes. Once released, the radiation bounces around in a labyrinth of gas and dust particles before ultimately escaping in the form of a virus radiation shower, causing system failures on a global scale. <br /><br />To date, 401 variants of the Ze-Lo-Emes Black Hole Virus have been detected, infecting more than 104,000 host machines. The viruses operate in a way similar to recently discovered root-kits and is capable of corrupting a computer&#39;s read only memory (ROM), making them undetectable by traditional antivirus software. More worrisome is the virus&#39; capacity to survive the most extreme PC conditions, including the reformatting of a hard drive. <br /><br /><strong>Crashing Particles From Black Holes Make User Data Vulnerable </strong><br />Some of the effects of these viruses are that user data is so compromised that the user actually receives a new digital identity. While the user may have difficulty determining if they have a new identity, some other telltale signs of contamination include a seemingly random download of "Logan&#39;s Run" (Director&#39;s cut). The virus will then abruptly shut down the entire computer, but only after a user&#39;s credit card had been charged for the movie download. Other systems failures may include the random launching of "Space Balls" movie or a widget appearing on a PC updating the user on recent UFO sightings.<br /><br />Interestingly, the virus can only execute if a computer is in idle mode, but is inert when the computer is either on or off. Researchers are not clear about the cause, but some employers seem to value the virus&#39; ability to measure how much of an employee&#39;s time is not productive time at work. Despite some of the benefits of these viruses, Comodo advises extreme caution should a computer begin to exhibit strange behavior. <br /><br /><strong>Comodo Helps Users Fight Back </strong><br />Comodo urges IT staffs to take another sweep through their servers and look for any code anomalies. Individual users can protect themselves by rejecting any request to download an unexpected codec or security program. Additionally, Comodo has developed a highly sophisticated, infrared v-shield in the form of a T-shirt that can be used to cover a computer when it is idle to shield it from any radiation. The T-shirt is now available at As a final precaution, users can download Comodo Firewall Pro for protection that covers any PC mode.<br />

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone


Posted in Archive|