Happy anniversary Basit and Amjad! Twenty-five years ago this month, the Alvi brothers of Lahore, Pakistan, gave the world the Brain Virus, the first bit \n\nof malware capable of infecting a DOS-based PC. Back in those relatively innocent times, the brothers actually embedded their real names and business \n\naddress in the code and later told Time magazine they had written the virus to protect their medical software from piracy.Who knows what they were really thinking, but by all accounts the Brain Virus was relatively harmless. Twenty-five years later, most malware is \n\nanything but benign and cyber criminals pull off exploits the Alvi brothers never envisioned. \n\nSlideshow: Quiz: Separate Cyber Security Fact From Fiction7 Cybercrime Facts Executives Need to KnowNo longer just a way to make a political point or demonstrate one's technical prowess, malware has become a useful tool in the bag of tricks bad guys \n\nuse to steal from consumers and institutions alike. And just as big-time drug dealers and many criminal gangs now mimic the ways of legitimate business, \n\nhackers have begun to do the same. One particularly disturbing trend coming to light in this anniversary month is the production and online sale of "kits" that allow relatively unskilled \n\nhackers to create and launch malware attacks. And by "kit" I really do mean a kit. "Attack toolkits are bundles of malicious code tools used to facilitate the \n\nlaunch of concerted and widespread attacks on networked computers. Also known as crimeware, these kits are usually composed of prewritten malicious \n\ncode for exploiting vulnerabilities along with various tools to customize, deploy, and automate widespread attacks," according to a recent report by \n\nSymantec. Marc Fossi, a development manager for the giant security company, says attack kits are selling on the Web from $40 or $50 to about $4000. Some \n\nhackers peddling the higher-end kits even offer online support and subscription services, so customers can get updated versions of the malware. Symantec \n\nhas also observed advertisements offering to help install and set up purchased attack kits for a fee. "It's like a mirror of the legitimate software business," he \n\nsays. Here are six reasons to be concerned:1. Attack kits make it easier for relatively unsophisticated hackers to launch an attack. That's not to say that any computer-illiterate bozo \n\ncould successfully use one of these kits, but it's much easier than building a virus or other malware from the ground up, says Fossi.2. The prevalence, simplicity and effectiveness of the attack kits are contributing to an upward spike in cybercrime. For example, one major \n\nkit called ZeuS accounted for more than 90,000 unique malicious code variants as of August 2009. That's 90,000 different malware applications; the \n\nnumber of computers attacked by ZeuS is in the millions. Not coincidentally, ZeuS is designed primarily to steal financial details, such as the online banking \n\ncredentials of a victim. Its ease of use and ability to generate income makes it an appealing purchase for even novice cybercriminals. 3. Cyber criminals, like legitimate business people, believe in a return on investment. Since they're spending money to buy those attack kits, \n\nit's likely they'll want to use them. 4. Because buyers of the kits can get updates, they're using the newest and most potent versions of the malware, and that, of course, means \n\nusers will be hit even harder.5. Increasingly, attack toolkits include exploits for vulnerabilities that encompass multiple applications and technologies. This increases the \n\nlikelihood that an attack will succeed because there is a greater chance that the victim will be using one of the vulnerable applications and that one of the \n\napplications is unpatched.6. The attack kits spew out malware that can attack multiple platforms; so users of Macs or computers running the Linux operating system, \n\nwhich are usually considered safer than Windows, are at risk as well. Naturally, you want to defend yourself against these clowns. Some of the viruses and other kinds of malware are so that new your anti-virus and other \n\ntypes of protection might not recognize them, but many are known. So be sure you're running reputable defense programs and keep them updated. And \n\nsince many of the kits rely on "poisoned" Web sites, make certain that if your malware detector questions the authenticity of a site you pay attention and get \n\nout of there without clicking on anything. It's tempting to make jokes about those two wild and crazy guys from Pakistan, and to be sure, the story of the Brain Virus has its place in computer \n\nlore. But ultimately, this stuff isn't funny, and it's not really a happy anniversary. San Francisco journalist Bill Snyder writes frequently about business and technology. He welcomes your comments and suggestions. Reach him \n\nat firstname.lastname@example.org.Follow Bill Snyder on Twitter @BSnyderSF. Follow everything from CIO.com on Twitter @CIOonline.