• Home
  • NewTech
  • A.I
  • Crypto
  • Reviews
    • Apps Review
    • Game Review
    • Hardware Review
    • Laptop Review
    • Mobile Review
    • Software Review
    • Website Review
  • Money
  • Security
  • More
    • TechReport
    • Automobile
    • Tips & Tricks
    • Android
    • iPhone
    • Window 7
    • Windows 8
    • Software
    • Tech Movies
    • Tutorials
      • Web Design
      • SEO
  • Home
  • Tech Store
  • About US
  • Write for Us
  • Privacy Policy
  • Contact Us

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook Twitter YouTube
Trending
  • Dynamics 365 F&O Implementation in Regulated Industries
  • The Power of Big Data: Unleashing Insights for Businesses
  • The Importance of Regular Maintenance for WordPress Websites
  • AI in Social Media: The Good, the Bad, and the Ugly
  • Top VR Headsets for Private Entertainment
  • The Dark Side of Technology: Addiction and Mental Health Concerns
  • Personal Data Safety: Tips for Safeguarding Your Online Identity
  • Best Foldable Smart Phones and Flip Smart Phones
  • OnePlus 11R 5G in details review
  • The Best Uses of ChatGPT: A Guide to the Future of AI
Thursday, 28 September 2023
Facebook Twitter YouTube
TechFriend.IN
  • Home
  • NewTech

    Technological Advances in Future Digital Cameras

    July 20, 2020

    The New Technologies We Can See in 2020

    April 19, 2020

    The Technologies Being Used to Fight Coronavirus

    March 29, 2020

    What You Need to Know About FaceTime’s Eye Contact Autocorrection Feature

    August 2, 2019

    3 Virtual Reality Services for Industrial Applications

    April 30, 2019
  • A.I
  • Crypto
  • Reviews
    1. Apps Review
    2. Game Review
    3. Hardware Review
    4. Laptop Review
    5. Mobile Review
    6. Software Review
    7. Website Review
    Featured

    Dynamics 365 F&O Implementation in Regulated Industries

    August 4, 2023899 Views4 Mins Read
    Recent

    Dynamics 365 F&O Implementation in Regulated Industries

    August 4, 2023

    Top VR Headsets for Private Entertainment

    May 13, 2023

    Best Foldable Smart Phones and Flip Smart Phones

    March 19, 2023
  • Money

    How to be a freelancer? a complete freelancing Guide!

    October 20, 2022

    How can you earn money on Metaverse? 5 ways to earn money

    April 7, 2022

    Want To Play Ludo For Real Money? Here’s Your Guide To Getting Started

    December 16, 2020

    Making money with video: a simple and neat chance to earn well

    August 6, 2015
  • Security
  • More
    • TechReport
    • Automobile
    • Tips & Tricks
    • Android
    • iPhone
    • Window 7
    • Windows 8
    • Software
    • Tech Movies
    • Tutorials
      • Web Design
      • SEO
TechShop
TechFriend.IN

Top 5 Worst Computer Viruses – You should know

October 11, 2017Updated:January 12, 2018No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp Reddit
Share
Facebook Twitter LinkedIn Pinterest Email Tumblr Reddit Telegram WhatsApp

Getting infected with a malicious file is something that has happened to all computer operators at least once, in one fashion or the other. For most people, the situation is quite mild, requiring only a simple clean up, by installing and running a full virus scan of their system. But in other cases, the situation can be disastrous, with the computer completely bricking your system, which no antivirus software can protect your system from.

In this article, I will highlight some of the worst computer viruses in history, viruses that have caused a considerable amount of damaged to peoples and property.

This article will include all malicious files that include Trojan horses and worms. To date, these malicious files have been responsible for a considerable amount of damage, numbering in the billions.

Here are the five worse computer viruses:

Top 5 Worst Computer Viruses

SmartHomeShop

1. ILOVEYOU

The ILOVEYOU virus was known for being one of the widest spread in history, this virus was successful in wreaking havoc on millions of computer systems all over the world, causing an estimated $10 billion in damages. Estimates put the infected at 10% of the whole internet population at the time. This virus was so bad, that large corporations were forced to put their mailing systems offline, just to prevent it from infecting them.

Two Filipino programmers, Onel de Guzman and Reonel Ramones were found responsible for its creation. It worked by applying social engineering in order to get people to click on the attachment, in this case, it was a confession of love. The attachment, however, was a script disguised as a text document. Windows inability to show file extensions on attachments at the time was what they used to deceive the masses.

Once you clicked on it, it would send itself to everyone on your mailing list, while overwriting your computer files, replacing them with its self, thus making your system unbootable. The two programmers were never sentenced in a court of law, primarily because malware laws didn’t exist back then. However, this one single event led to the eCommerce law.

2. The Concept Virus

The Concept virus, as it was known, was shipped accidentally on a CD-ROM which was supplied by Microsoft way back in 1995. This was the first virus to actually infect Microsoft Word. Within just a couple of days, a significant amount of the computer user population was infected with this virus. The virus itself took advantage of people’s tendency to share documents across the internet.

3. The Anna Kournikova Worm

The Anna Kournikova worm was created and disguised as a picture of the tennis player. The worm was created by Jan de Wit, who was an obsessed admirer of her. He was eventually arrested and given a community service sentence.

4. Code Red

Code Red first arrived in 2001 and was discovered by two security employees at eEye Digital. The virus was named Code Red, because the two security guards were drinking Code Red Mountain Dew when they first discovered it. The worm worked by exploiting vulnerabilities in the buffer overflow problem of computer systems that had Microsoft IIS web server installed. The worm ran entirely on memory, which means little to no trace of it was left on the system. Its file size was around 3 bytes, to its advantage and once it got onto your system, it would proceed to replicate itself while at the same time consuming more and more system resources.

It would then launch a DoS or Denial of Service attack on several IP addresses which were widely used by the White House. It would also allow the hacker to gain backdoor access to a server. One of the most memorable things about it was the message it left on web pages that it had hacked “Hacked by Chinese!” This message went on to become a meme itself. A patch was eventually released which counter the worm, but by that time, it had already caused $2 billion in damages, due primarily to losses in productivity. The worm affected an estimated 1 – 2 million servers, which was a considerable amount, especially when you consider the fact that there were only 6 million IIS servers at that time.

5. Netsky and Sasser

The Netsky and Sasser worms were written by German teenager Seven Jaschan who was eventually caught and arrested. At the time of his arrest, he was found to be responsible for more than 70% of all the malware circulating the internet at the time, but was fortunate to escape prison time, later going on to be hired by a security company as an ethical hacker.

Earn.Directory
Computer Viruses ILOVEYOU virus Worst Computer Viruses
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit WhatsApp

Related Posts

Personal Data Safety: Tips for Safeguarding Your Online Identity

March 31, 2023 Security

Why Cybercrime is Increasing And How To Stay Secure?

April 1, 2021 Security

Automotive Cyber hacking : Is your car liable to Cyber hacking?

September 11, 2020 Security
Shopping Offers


Categories
  • Artificial Intelligence (5)
  • Automobile (4)
  • Cryptocurrency (3)
  • Earn Money Online (4)
  • Metaverse (1)
  • Mobile (18)
  • New Technology (16)
  • Security (17)
  • Tech Interview (1)
  • Tech Report (31)
  • Tech Review (52)
  • Tips & Tricks (24)
  • Tutorials (5)
  • Web Design (8)
Stay In Touch
  • Facebook 96.5K
  • YouTube 35.8K
  • Twitter 15K
  • Instagram
Latest Reviews
Software Review

Dynamics 365 F&O Implementation in Regulated Industries

August 4, 2023899 Views4 Mins Read
VR and AR

Top VR Headsets for Private Entertainment

May 13, 20231K Views7 Mins Read
Android

Best Foldable Smart Phones and Flip Smart Phones

March 19, 20231K Views16 Mins Read

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

About
About

Techfriend.IN is a technology blog website that focuses on providing news and information about the latest developments in the field of technology. It covers a wide range of topics including software, hardware, internet, crypto, mobile devices, and more. The blog aims to provide its readers with in-depth analysis and opinions on the latest trends and innovations in the tech world. It also serves as a resource for those looking to stay up-to-date on the latest technologies and their applications.

Facebook Twitter RSS
Most Popular

Should You Invest in Cryptocurrency In 2022? – The Future is Here

April 3, 20223K Views

Guide – To Restore Deleted Images in Windows 10, 11

December 9, 20213K Views

Best IPTV Players For Windows 10/8/7 (Download FREE)

October 11, 20193K Views

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

© 2023 TechFriend.IN | All Rights Reserved!
  • Home
  • Tech Store
  • About US
  • Write for Us
  • Privacy Policy
  • Contact Us

Type above and press Enter to search. Press Esc to cancel.