Tooele Transcript Bulletin – News in Tooele, Utah

October 5, 2017
Virus attack map shows how active hackers are at work

Most of us don’t realize just how much virus activity there is in our own world, let alone the whole world. However, there is an online, real-time, virus attack map by Norse Corp., that helps us realize just how active the hacking world is.

It’s no surprise that Yahoo admitted that all 3 billion of their accounts were hacked, instead of just the 1 billion they previously thought, or the 500,000 they previously thought before the one billion. Until Yahoo can demonstrate effective security for their account holders, I don’t recommend using their products.

Let’s take a look at the virus attack map. Open an Internet browser and in the address bar at the top, type in: “” without quotation marks. When the map opens, if it doesn’t show any activity, just refresh your window by pressing F5 on a PC or click View and then Reload Page on a Mac.

According to its website, Norse Corp. has “over eight million sensors” around the world and it has more than seven petabytes of attack history data. So you know, one petabyte equals 1,000 terabytes.

As you view the map, the key at the bottom helps you recognize the origin and target of the hacks, as well as specific and detailed information about each live attack displayed on the bottom-right.

You’ll also see a dial where you can zoom the map in and out and if you click the “i,” the “Intelligence Legend” appears for more information about understanding the map.

Below the dial, clicking “Explore” allows you to choose specific filters for the map display and clicking “Why Norse?” will tell you more about the company and how it works to “maintain the world’s largest dedicated threat intelligence network.”

Virus attacks are serious for all of us and it is important you take actions to protect yourself, your assets, your data and your family.

For more than 15 years, Scott Lindsay has helped tens of thousands of people better their skills, publishing more than 400 articles about Apple and Microsoft software, the computer and the Internet. You can reach Scott for comments or questions at

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>