Top 10 Computation Viruses

1 min


0
472 shares
Top 10 Computation Viruses
Advertisements

Viruses have evolved since teenage hackers created them to compete with each other and cause some clutter. Now, professional hackers belong to criminal gangs or spy agencies because it is information theft or destruction with a purpose, damages are greater and malware are capable of affecting the production of industries and the functioning of banks and agencies governmental organizations.

Advertisements

Here is a list of the most harmful viruses of recent years.

1. Love Letter / I LOVE YOU (2000)
In 2000, an e-mail was titled simply “I Love You”, but instead of being a loving confession, it really was a “worm”, which after overwriting the images of users was sent by email to 50 contacts of the user’s Windows calendar.
2. Code Red (2001)
Compared to modern malware Code Red seems not to be so dangerous, however, in 2001, it surprised online security experts by using a bug in the Microsoft Information Server, getting down and changing some websites.
3. Slammer (2003)
In January 2003, Slammer proved how harmful a worm could be for public and private services. The worm freed an avalanche of network packets, and the amount of data is transmitted over the internet caused several servers to suspend activities almost immediately.
4. Fizzer (2003)
Fizzer, he was after the money. Many dismissed the worm as it did not move with the speed of Code Red, but what made it more dangerous is that it was a worm created for profit.
5. My Doom (2004)
In 2004, it managed to infect about a million machines by launching a massive denial of attack service, by doing so it overwhelms its purpose by sending information from various systems.
6. PoisonIvy (2005)
PoisonIvy belongs to the group of malware known as “a remote Trojan” because it allows the virus creator to have full access to infected machines using a kind of backdoor, to the extent that it allows recording and manipulating information from the computer.
7. Zeus (2007)
It is currently the most commonly used malware to illegally obtain personal information. Stolen personal information can be used to make online purchases or create bank accounts in the name of a compromised identity.
8. Agent.btz (2008)
The virus spreads through infected memories that install malware that steals information. When agent.btz was found on Pentagon computers, they suspected it was the work of foreign spies.
9. Conficker Virus (2009)
In 2009 this new virus affected millions of Windows machines around the world. He managed to create a global army spice that stole all sorts of information. Because it was really difficult to stop was created a group of experts dedicated specifically to stop it, the virus came to be known as the “superbug”, or “super worm.”
10. Stuxnet (2009-2010)
The malware was primarily aimed at damaging industrial systems. Based on information from the International Atomic Energy Agency, experts believe the virus was responsible for causing many centrifuges that processed uranium in Iran to spin until they lost control and self-destruct.

Read AlsoA Man Arrested By The FBI After Saving The World From Cyberattack

Advertisements

Like it? Share with your friends!

0
472 shares

What's Your Reaction?

hate hate
608
hate
confused confused
2432
confused
fail fail
1520
fail
fun fun
1216
fun
geeky geeky
912
geeky
love love
3040
love
lol lol
304
lol
omg omg
2432
omg
win win
1520
win
Choose A Format
Personality quiz
Series of questions that intends to reveal something about the personality
Trivia quiz
Series of questions with right and wrong answers that intends to check knowledge
Poll
Voting to make decisions or determine opinions
Story
Formatted Text with Embeds and Visuals
List
The Classic Internet Listicles
Open List
Submit your own item and vote up for the best submission
Ranked List
Upvote or downvote to decide the best list item
Meme
Upload your own images to make custom memes
Video
Youtube, Vimeo or Vine Embeds
Audio
Soundcloud or Mixcloud Embeds
Image
Photo or GIF
Gif
GIF format