Top 10 Computation Viruses

1 min

Top 10 Computation Viruses

Viruses have evolved since teenage hackers created them to compete with each other and cause some clutter. Now, professional hackers belong to criminal gangs or spy agencies because it is information theft or destruction with a purpose, damages are greater and malware are capable of affecting the production of industries and the functioning of banks and agencies governmental organizations.


Here is a list of the most harmful viruses of recent years.

1. Love Letter / I LOVE YOU (2000)
In 2000, an e-mail was titled simply “I Love You”, but instead of being a loving confession, it really was a “worm”, which after overwriting the images of users was sent by email to 50 contacts of the user’s Windows calendar.
2. Code Red (2001)
Compared to modern malware Code Red seems not to be so dangerous, however, in 2001, it surprised online security experts by using a bug in the Microsoft Information Server, getting down and changing some websites.
3. Slammer (2003)
In January 2003, Slammer proved how harmful a worm could be for public and private services. The worm freed an avalanche of network packets, and the amount of data is transmitted over the internet caused several servers to suspend activities almost immediately.
4. Fizzer (2003)
Fizzer, he was after the money. Many dismissed the worm as it did not move with the speed of Code Red, but what made it more dangerous is that it was a worm created for profit.
5. My Doom (2004)
In 2004, it managed to infect about a million machines by launching a massive denial of attack service, by doing so it overwhelms its purpose by sending information from various systems.
6. PoisonIvy (2005)
PoisonIvy belongs to the group of malware known as “a remote Trojan” because it allows the virus creator to have full access to infected machines using a kind of backdoor, to the extent that it allows recording and manipulating information from the computer.
7. Zeus (2007)
It is currently the most commonly used malware to illegally obtain personal information. Stolen personal information can be used to make online purchases or create bank accounts in the name of a compromised identity.
8. Agent.btz (2008)
The virus spreads through infected memories that install malware that steals information. When agent.btz was found on Pentagon computers, they suspected it was the work of foreign spies.
9. Conficker Virus (2009)
In 2009 this new virus affected millions of Windows machines around the world. He managed to create a global army spice that stole all sorts of information. Because it was really difficult to stop was created a group of experts dedicated specifically to stop it, the virus came to be known as the “superbug”, or “super worm.”
10. Stuxnet (2009-2010)
The malware was primarily aimed at damaging industrial systems. Based on information from the International Atomic Energy Agency, experts believe the virus was responsible for causing many centrifuges that processed uranium in Iran to spin until they lost control and self-destruct.

Read AlsoA Man Arrested By The FBI After Saving The World From Cyberattack


Like it? Share with your friends!


What's Your Reaction?

hate hate
confused confused
fail fail
fun fun
geeky geeky
love love
lol lol
omg omg
win win