Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
      Political war erupts over BEE in the ICT sector - Solly Malatsi

      Political war erupts over BEE in the ICT sector

      13 December 2025
      Icasa told to align on BEE in move that will favour Starlink - Solly Malatsi

      Icasa told to align on BEE in move that will favour Starlink

      12 December 2025
      South African solar industry faces a reality check

      South African solar industry faces a reality check

      12 December 2025
      OpenAI launches GPT-5.2 after 'code red' push to counter Google. Shelby Tauber/Reuters

      OpenAI launches GPT-5.2 after ‘code red’ push to counter Google

      12 December 2025
    • World
      Oracle’s AI ambitions face scrutiny on earnings miss

      Oracle’s AI ambitions face scrutiny on earnings miss

      11 December 2025
      China will get Nvidia H200 chips - but not without paying Washington first

      China will get Nvidia H200 chips – but not without paying Washington first

      9 December 2025
      IBM reportedly close to $11-billion deal to buy Confluent - Arvind Krishna

      IBM reportedly close to $11-billion deal to buy Confluent

      8 December 2025
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
      Google makes final court plea to stop US breakup

      Google makes final court plea to stop US breakup

      21 November 2025
    • In-depth
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      Canal+ plays hardball - and DStv viewers feel the pain

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
    • TCS
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
    • Opinion
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Editor's pick » Why save a computer virus?

    Why save a computer virus?

    By The Conversation9 August 2016
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    malware-640

    On average, 82 000 new malware threats are created each day. These include all sorts of malicious software — computer viruses, computer worms and ransomware. Some are pranks or minor annoyances; others seek to pilfer data or extort money. Malware has been used to steal sensitive e-mails from political parties, or even as weapons directed at civilian, government or military targets.

    Malware has been called a “pervasive feature of the Internet” by the head of the British Library’s digital preservation team. A multibillion-dollar industry exists to control its spread. Though it is part of the texture of digital life, libraries, museums and archives tasked with preserving the past are not saving malware for future generations. They are likely (and rightly) afraid: it can destroy data, which librarians and archivists are bound to protect.

    Without long-term preservation, though, viruses and worms themselves will be difficult to analyse, research or write about. Cultural heritage institutions should seek to archive malware in ways that render it safely accessible to researchers and historians.

    Our research has addressed two separate but connected concerns: First, how would an institution create a malware archive? And second, how should archivists, who have already encountered malware-infected hard drives and disks in their collections, handle these items? If an archivist chooses to remove the infection, what might we lose? And if the malware is not removed, how can the infected data be stored and accessed safely?

    Studying e-infections

    A recent history of malware appears in the new film Zero Days, a documentary about the Stuxnet worm that destroyed Iranian nuclear equipment. Zero Days reveals that researchers not only examined Stuxnet’s code to discover how it worked, but also looked at current geopolitics to determine why it was created.

    Without efforts to save code and other items that add context, researchers may lose the ability to conduct similar analysis in the future — and to check the work of the past. Information related to historical malware can disappear from the Internet. For example, antivirus firms have removed publicly accessible information about malware from their websites.

    malware-640

    In 1988, Robert Morris, a Cornell graduate student, released the first worm to draw widespread attention. Morris’s motivations remain unclear, but some suspect curiosity, hubris or the desire to demonstrate network vulnerabilities.
    Since then, malware has been used for many purposes:

    • As a political statement, such as the Wank worm, released to express political dissent. Today the hacktivist movement includes groups like Anonymous (which has carried out online actions in support of Black Lives Matter and the Occupy movement) and Cult of the Dead Cow (which attempted to interfere with China’s Internet censorship technologies).
    • To disrupt the rhythms of everyday life, such as ILOVEYOU, which in 2000 infected more than 50m computers over 10 days. It cost an estimated US$5,5bn to $8,7bn in lost time and data recovery expenses. It prompted the Pentagon, the CIA and many corporations to temporarily shut down their e-mail systems.
    • As artistic expression, such as the Rebel! virus, part of an Italian art installation. Since then, artists like Eva and Franco Mattes (with hacker group Epidemic) and James Hoff have created malware or used malware code in their work.
    • To affect world conflicts, such as the 2015 Ukrainian conflict, when malware took down part of Ukraine’s electric grid. The Egyptian government monitored political dissidents’ communications with spyware during the 2011 Arab Spring.

    As Internet connectivity becomes a feature of home heating and security devices, medical devices and even baby monitors, security experts worry about increasing numbers of malware attacks on this equipment.

    An important resource for research

    As digital culture scholar Jussi Parikka wrote recently, malware reflects the society in which it arose. In the 1990s, for example, not only were several computer viruses named for Aids, but computer security professionals used “safe sex” analogies to explain how to keep electronics virus-free.

    The interactions between malware, culture and history should not be lost. Just as historians have examined FBI wiretaps on Martin Luther King Jr’s phone, researchers will want to know if a prominent activist had spyware on their computer and who likely installed it. Dissecting the spyware itself may prove crucial in understanding how the surveillance worked and its ultimate goal.

    Literary scholars will want to know if a virus damaged an early draft of an important novel. Malware on a corporate executive’s computer could be evidence of espionage or a protest against the company.

    Who is saving malware?

    Computer security companies and security organisations hold the most comprehensive and well-organised collections of malware. However, these collections are not easy for researchers or the general public to browse — and were never designed for that use. And these organisations are not required to preserve their collections long-term. Their primary mission is to fight current malware threats.

    No organisation has discarded unique samples yet. But what if the company with the best malware collection suddenly closed its doors?

    computer-virus-640

    Cultural heritage institutions, on the other hand, exist to keep objects for centuries, sometimes millennia, and make them broadly accessible. They can preserve a historical sample of malware for the future and ensure patrons can easily find and view the items they want to learn about.

    Some efforts have already been taken to exhibit malware, including the Malware Museum, Daniel White’s YouTube channel and exhibits at swissnex San Francisco and Frankfurt’s Museum of Applied Arts. While these endeavours are commendable, they were mostly undertaken as side projects by individuals with other primary responsibilities. And they have displayed only a small number of viruses or worms and focused on their visual effects. None have committed to systematically collecting items that would give the malware further context.

    Challenges of preserving malware

    Saving and analysing software often designed to wreak havoc — deleting files or launching Internet-based attacks — presents unique challenges and requires complex solutions.

    Even with special precautions (like simulated networks that fool malware into thinking it’s online), studying malware will become increasingly difficult. Like all software, malware eventually becomes obsolete: one day, no contemporary computers will be able to demonstrate how these programs functioned without emulation or virtualisation.

    Institutions have not yet begun to face the question of which malware to preserve. Should viruses and worms that infected massive numbers of computers be the primary goal for preservationists? What about malware displaying novel programming techniques, or released in conjunction with offline protest? How can they even begin to evaluate candidates for preservation, given the massive amounts of malware constantly being created?

    The work ahead

    Working collaboratively, archivists can learn how to appraise the historical value of malware, assess and mitigate the risks of storing it, and document its existence or potential removal.

    Any malware collection should aim beyond saving code. It should capture the process of development (which will be difficult as most malware creators prefer to remain anonymous), as well as the sometimes short-lived effects of the infection. For example, archivists can collect oral histories of computer security professionals and, if possible, malware coders. They can also save websites, e-mails and log files pertaining to an infection.

    Already, scholars like Jussi Parikka, Finn Brunton, Eugene Thacker and Alexander Galloway have explored the importance of malware in contemporary communications. Archives, museums and libraries can support future research with well-curated collections.

    Highlighting a seldom recognised aspect of computing history, a malware archive could spark the creation of new cultural histories. By preserving malware, we can understand how we got from the Morris worm in 1988 to Stuxnet to July’s US Democratic National Committee e-mail hack — and beyond.The Conversation

    • Howard Besser is professor of cinema studies, New York University; Jonathan Farbowitz is a graduate student in moving image archiving and preservation, New York University
    • This article was originally published on The Conversation


    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleCwele files suit over spectrum auction
    Next Article SA marks one year of no load shedding

    Related Posts

    ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality

    ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

    14 December 2025
    Political war erupts over BEE in the ICT sector - Solly Malatsi

    Political war erupts over BEE in the ICT sector

    13 December 2025
    Icasa told to align on BEE in move that will favour Starlink - Solly Malatsi

    Icasa told to align on BEE in move that will favour Starlink

    12 December 2025
    Company News
    When the physical world goes online: the new front line of cyber risk - Snode Technologies

    When the physical world goes online: the new front line of cyber risk

    12 December 2025
    Endless possibilities with Adapt IT Telecoms' unified VAS platform - Matthew Seabrook

    Endless possibilities with Adapt IT Telecoms’ unified VAS platform

    11 December 2025
    Securing IoT connectivity: how MSB Micro Systems keeps devices in check

    Securing IoT connectivity: how MSB Micro Systems keeps devices in check

    11 December 2025
    Opinion
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality

    ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

    14 December 2025
    Political war erupts over BEE in the ICT sector - Solly Malatsi

    Political war erupts over BEE in the ICT sector

    13 December 2025
    Icasa told to align on BEE in move that will favour Starlink - Solly Malatsi

    Icasa told to align on BEE in move that will favour Starlink

    12 December 2025
    South African solar industry faces a reality check

    South African solar industry faces a reality check

    12 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}