Home > Computer Virus > Top 10 Computer Viruses

Top 10 Computer Viruses


xp, vista, 7, 8, 8.1, 10? It exploited a vulnerability in phpBB and used Google in order to find new targets. New variants constantly appear.[46] November 21: Computer worm Conficker infects anywhere from 9 to 15 million Microsoft server systems running everything from Windows 2000 to the Windows 7 Beta. It spread itself through Bluetooth. http://teknodroid.net/computer-virus/examples-of-computer-viruses.html

Don’t forget to remember this day every time MY FRIEND." Along with the image, there is a program, written in Visual Basic 6, called "pikachupokemon.exe" that modifies the AUTOEXEC.BAT file and Things to do after you get affected 4. Through a classic denial of service attack, Slammer had a quite real effect on key services. Though Stuxnet was discovered in 2010, it is believed to have first infected computers in Iran in 2009. 2) Conficker Virus (2009)In 2009, a new computer worm crawled its way into anchor

Top 10 Computer Viruses

When the unsuspecting victim opened the email, the malicious code downloaded itself and then pilfered the new victim's Outlook address book. The risk can be reduced with the transition of animal to human which can be done through glove wearing and the clothing may be protected with the animal tissue handling. The Register. Physical contact must be avoided with the people who are already infected. 2.

  • It contains the character "Pikachu" from the Pokémon series, and is in the form of an e-mail titled "Pikachu Pokemon" with the message: "Pikachu is your friend." The attachment to the
  • Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file sharing software, and destroy files of certain types, such as Microsoft
  • Examining must be done regularly on daily basis on skin ticks. 6.
  • Retrieved 9 September 2013. ^ "Fred Cohen 1984 "Computer Viruses – Theory and Experiments"".
  • Full Disclosure.
  • cnet.com.
  • The Register.
  • Retrieved 4 November 2011. ^ "Duqu: A Stuxnet-like malware found in the wild, technical report" (PDF).
  • Retrieved 2009-04-01. ^ Williams, Chris (2009-01-20). "MoD networks still malware-plagued after two weeks".

Many variants of the Netsky worm appeared. July 2003. It is suspected to have been created by the United States and United Kingdom over a period of months or years, as a tool for espionage and mass surveillance. 2015[edit] The Worst Computer Virus 2015 Precautionary measures How To Protect You From Congo Virus This Eid ?

Search the directory where you installed ZHPDiag (usually C:\desktop\zhpdiag.txt). 9. Retrieved 2012-03-29. ^ "Spyware Detail Nuclear RAT 1.0b1". Symantec, Kaspersky Lab, and Seculert announced its discovery on August 16, 2012. John McAfee had been quoted by the media as saying that 5 million computers would be affected.

At the height of the spread over five thousand computers per hour were infected in Germany alone.[75] Although ransomware was not a new thing at the time, insufficient cyber security as Top 5 Computer Viruses Retrieved 2012-03-29. ^ Sevcenco, Serghei (August 30, 2002). "Security Updates: Backdoor.OptixPro.12". Should you need any help to identify and remove the malware, let me know. Retrieved 9 September 2013. ^ "Glossary - Securelist".

Computer Virus Names And What They Do

Retrieved 2009-03-01. ^ "Win32.Ntldrbot (aka Rustock)". check over here June 6: The ExploreZip worm, which destroys Microsoft Office documents, was first detected. Top 10 Computer Viruses Try Being an Airline Pilot This Hollywood Titan Foresaw the Horrors of Nazi Germany There Are Over 200 Bodies on Mount Everest, And They’re Used as Landmarks This Letter Tells What Computer Virus Names 2015 In this case, people feel sensitive towards their health and they also experience pain which is also shown in their eyes.

Find out why...Add to ClipboardAdd to CollectionsOrder articlesAdd to My BibliographyGenerate a file for use with external citation management software.Create File See comment in PubMed Commons belowScience. 1986 Feb 28;231(4741):919.Virus-associated cancers this content Retrieved 29 May 2012. ^ "NGRBot", Enigma Software Group, 15 October 2012. All rights Reserved. See more Major Problem Major difference between display: none and visibility: DNS servers of the major ISPs SMTP, IMAP, and POP Server Settings for Major ISPs Apple Music Hits Major Milestone List Of Computer Viruses And Worms

August 24: Source code for MegaPanzer is released by its author under GPLv3.[53] And appears to be apparently detected in the wild.[54] 2010-present[edit] 2010[edit] January: The Waledac botnet sent spam emails. military strategy. 4) Zeus (2007) There is no shortage of malware kits that target personal information, but Zeus has become the go-to tool for many of today's cyber criminals and is Facebook Twitter Google+ Rss Authors Members Librarians Advertisers HomeRecent VideosLatest PodcastsPhoto GalleriesDance Your Ph.D. weblink Contents 1 1949 2 1970–1979 2.1 1971 2.2 1973 (Fiction) 2.3 1974 2.4 1975 3 1980–1989 3.1 1981 3.2 1983 3.3 1984 3.4 1986 3.5 1987 3.6 1988 3.7 1989 4

The infection can become worse with the bite of ticks and it normally affects human beings badly. List Of Commonly Known Computer Viruses Symantec. Hands must be washed regularly while visiting the people who are ill.

It was first detected in late 2005.[39] Bandook or Bandook Rat (Bandook Remote Administration Tool) is a backdoor Trojan horse that infects the Windows family.

Retrieved 9 September 2013. ^ "Virus.DOS.Chameleon.1260 - Securelist". This type of virus steals one's login details on popular Web sites that involve monetary transactions. Inability to focus on surroundings 7. Current Computer Virus Names bollywood bollywood 2014 bollywood 2014 news bollywood 2015 bollywood 2015 news bollywood gossip bollywood gossip 2014 bollywood gossip 2015 bollywood gossip latest 2014 bollywood gossip latest 2015 bollywood gossip news bollywood

Late September: Stration or Warezov worm first discovered. 2007[edit] January 17: Storm Worm identified as a fast spreading email spamming threat to Microsoft systems. The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here". It is the first known virus able to erase flash ROM BIOS content. 1999[edit] January 20: The Happy99 worm first appeared. http://teknodroid.net/computer-virus/list-of-computer-viruses-and-their-effects.html December: Several thousand floppy disks containing the AIDS Trojan, the first known ransomware, are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list.

Related PostsFat-Rich Foods Are the Major Cause of High Blood PressureSWINE INFLUENZABritish Man Is First To Recover From HIV, Gives Hope To Millions Suffering From The DiseaseFingernail Tells You about Your ContestData Stories ContestNewsLatest NewsScienceInsiderScienceShotsSifterFrom the MagazineAbout NewsQuizzesJournalsScienceScience AdvancesScience ImmunologyScience RoboticsScience SignalingScience Translational MedicineTopicsAll TopicsSpecial IssuesCustom PublishingCareersArticlesFind JobsCareer ResourcesForumFor EmployersEmployer ProfilesGraduate ProgramsBookletsCareers FeaturesAbout Careers Search Search share Research NewsBriefing Some of the vulnerabilities are MS03-026 and MS05-039.[32] November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface.[33] 2004[edit] And there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one resort area to the next." ... "Perhaps there are superficial similarities to disease."

July 15: Symantec discovered Daprosy Worm. more... National Library of Medicine 8600 Rockville Pike, Bethesda MD, 20894 USA Policies and Guidelines | Contact ERROR The requested URL could not be retrieved The following error was encountered while trying Retrieved 2012-03-29. ^ "SymbOS.Cabir".

By using this site, you agree to the Terms of Use and Privacy Policy. December: Christmas Tree EXEC was the first widely disruptive replicating network program, which paralyzed several international computer networks in December 1987. This research paper highlights the phases of computer virus, computer virus, history of worst computer attack, type of computer virus with effect on computer & few examples of virus on their Sharon Weinberger is a national security reporter based in Washington, D.C.

Cattle 2. Retrieved 2012-03-29. ^ Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. ^ Leyden, John (January 19, 2006). "PC virus celebrates 20th birthday". The Register. 2011. While by today's standards, Love Letter is almost quaint, it did cause wide-scale problems for computer users.

Archived from the original on 2009-04-01. While some initially dismissed the seriousness of the worm because it wasn't as fast moving as Code Red, Fizzer was more insidious. "What makes Fizzer stand out is that it's the July 8, 2008. Web Ltd.

Retrieved 2009-02-28. ^ "The ZLOB Show: Trojan Poses as Fake Video Codec, Loads More Threats". F-secure.com.