Viruses, Trojan and worm programs are not the only harmful programs so they are afraid. The logical bomb is much less known by the user, because the accidental user of the Internet is not likely to become its victim. Information port Howtogek.com speakWhat are logical bombs and how they work.

The idea of a logical bomb is quite simple. In fact, this is a malicious code integrated in abnormal software. This code is waiting until a specific condition is met, then it explodes online – meaning it is activated.
The logical bomb is especially dangerous due to the fact that until the conditions are specified by the attacker, they are simply waiting in the wings. For example, in the case of viruses, the code tries to multiply and perform actions may seem suspiciously seemed to be protected programs. In addition, logical bombs are often developed to defeat a specific target reaction software that does not protect them, because they do not have a unique virus signature.
How does logic work work?
Programmers set a specific activation logic bomb. For example, the beginning of certain days and time, delete a file or enter the account. Such peculiarity is one of the factors that make the logic bomb very dangerous. Moreover, as the result of the “explosion”, they can release other malware. Theoretically, some viruses or trojans can infect the system, put a logical bomb into it, and then remove itself.
Logic bombs have been used quite successfully in reality. Therefore, one of the most famous cases of using such a program is the scandal surrounding the Polish Railway Company Newag. Her trains were programmed in a way to break if GPS found that they were being conducted in the conference of competitors. And in 2013, the logical bomb has formed hard drives in three Korean banks and two media companies at the same time.
Protection against logic bombs
It is difficult to protect yourself from logical bombs, and it is harder to stop them. Currently, no magic program can protect the computer from an unexpected attack. Companies and organizations must rely on code audits to ensure that malicious code has not crept into terminals or applications.