most dangerous pc viruses

    The most dangerous PC viruses of all time

    In the early days of the personal computer, viruses were something of a novelty. In the 1980s and early 1990s, as PCs became more widespread, viruses began to be used as a tool for political and criminal activity. Here are some of the most dangerous PC viruses of all time.

    The Morris worm was one of the first viruses to demonstrate the potential damage that could be caused by a computer virus. The Morris worm was released in 1988 and quickly spread across the internet, infecting thousands of computers. The worm caused significant damage, leading to an estimated $10 million in damages.

    The Love Bug virus was released in 2000 and quickly spread around the world, causing an estimated $10 billion in damages. The Love Bug virus was notable for its ability to spread quickly and for its destructive payload, which could delete important files from infected computers.

    The Mydoom virus was released in 2004 and quickly became the most destructive virus in history, causing an estimated $20 billion in damages. The Mydoom virus was notable for its ability to spread quickly and for its destructive payload, which could delete important files from infected computers.

    The SoBig virus was released in 2003 and quickly became the most destructive virus in history, causing an estimated $30 billion in damages. The SoBig virus was notable for its ability to spread quickly and for its destructive payload, which could delete important files from infected computers.

    The WannaCry virus was released in 2017 and quickly spread around the world, causing an estimated $4 billion in damages. The WannaCry virus was notable for its ability to spread quickly and for its destructive payload, which could encrypt important files on infected computers.

    The most dangerous PC viruses of all time have demonstrated the significant damage that can be caused by a computer virus. These viruses have caused billions of dollars in damages and have infected millions of computers around the world..Click for source

    The 20 most common PC viruses
    and how to remove them

    A virus is a code that replicated itself by infecting other files and programs on a computer. Viruses spread by tricking people into Clicking on them, and they can do all sorts of damage to your computer, from deleting files to stealing your personal information.

    While there are hundreds of thousands of different strains of viruses, there are some that are more common than others. In this article, we’ll take a look at the 20 most common PC viruses and how to remove them.

    1. The Blaster Worm

    Blaster was a particularly virulent worm that first appeared in August of 2003. It attempts to spread itself by exploiting a flaw in Microsoft’s Windows operating system. When it successfully infects a computer, it will display a message that says “I just want to say LOVE YOU SAN.”

    The worm then proceeds to shut down key Windows components, including the security system, making the infected computer vulnerable to further attack.

    Fortunately, there are a number of removal tools available for Blaster, and Microsoft released a patch to fix the security flaw that the worm exploits.

    2. The Sasser Worm

    Sasser is another worm that takes advantage of a flaw in Windows to spread itself. Unlike Blaster, however, Sasser does not need any user interaction to propagate itself.

    Once a computer is infected with Sasser, the worm will attempt to spread to other computers on the same network. Sasser will also cause the infected computer to crash and reboot repeatedly.

    Fortunately, there are also a number of removal tools available for Sasser, and Microsoft released a patch to fix the security flaw that the worm exploits.

    3. The Mydoom Worm

    Mydoom is a particularly nasty worm that appeared in February of 2004. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line of “Hi!” and will contain an attachment that, when opened, will infect the computer with the worm.

    Mydoom also has a “backdoor” functionality that allows remote attackers to gain access to the infected computer. This can be used to steal sensitive information or to install other malicious software.

    Fortunately, there are also a number of removal tools available for Mydoom, and Microsoft released a patch to fix the security flaw that the worm exploits.

    4. The SoBig Worm

    SoBig is a worm that first appeared in 2003. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    SoBig will also create a hidden file on the infected computer that will be used to store any email addresses that the worm finds. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for SoBig, and Microsoft released a patch to fix the security flaw that the worm exploits.

    5. The Nimda Worm

    Nimda is a particularly nasty worm that first appeared in September of 2001, just weeks after the 9/11 terrorist attacks. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that says “README” and will contain an attachment that, when opened, will infect the computer with the worm.

    Nimda also has a “double-extension” file-flooding technique that allows it to spread itself by creating thousands of files with random names. This can quickly fill up a hard drive and render a computer unusable.

    Fortunately, there are also a number of removal tools available for Nimda, and Microsoft released a patch to fix the security flaw that the worm exploits.

    6. The Code Red Worm

    Code Red was a particularly virulent worm that first appeared in July of 2001. It attempts to spread itself by exploiting a flaw in Microsoft’s Internet Information Services (IIS) web server software. When it successfully infects a computer, it will display a message that says “Hacked ByChinese!”

    The worm then proceeds to disable security features on the infected computer, making it vulnerable to further attack.

    Fortunately, there are a number of removal tools available for Code Red, and Microsoft released a patch to fix the security flaw that the worm exploits.

    7. The SirCam Worm

    SirCam is a worm that first appeared in 2001. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    SirCam will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for SirCam, and Microsoft released a patch to fix the security flaw that the worm exploits.

    8. The Klez Worm

    Klez is a worm that first appeared in 2001. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    Klez will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Klez, and Microsoft released a patch to fix the security flaw that the worm exploits.

    9. The BugBear Worm

    BugBear is a particularly nasty worm that first appeared in 2001. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that says “Hi!” and will contain an attachment that, when opened, will infect the computer with the worm.

    BugBear will also disable security features on the infected computer, making it vulnerable to further attack.

    Fortunately, there are also a number of removal tools available for BugBear, and Microsoft released a patch to fix the security flaw that the worm exploits.

    10. The SQL Slammer Worm

    SQL Slammer is a particularly nasty worm that first appeared in January of 2003. It attempts to spread itself by exploiting a flaw in Microsoft’s SQL Server software. When it successfully infects a computer, it will disable the security features, making the infected computer vulnerable to further attack.

    Fortunately, there are also a number of removal tools available for SQL Slammer, and Microsoft released a patch to fix the security flaw that the worm exploits.

    11. The L10n Worm

    L10n is a worm that first appeared in 2004. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    L10n will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for L10n, and Microsoft released a patch to fix the security flaw that the worm exploits.

    12. The Whack-a-mole Worm

    Whack-a-mole is a worm that first appeared in 2006. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that says “Whack-a-Mole!” and will contain an attachment that, when opened, will infect the computer with the worm.

    Whack-a-mole will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Whack-a-mole, and Microsoft released a patch to fix the security flaw that the worm exploits.

    13. The WM/ICQ Worm

    WM/ICQ is a worm that first appeared in 2003. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    WM/ICQ will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for WM/ICQ, and Microsoft released a patch to fix the security flaw that the worm exploits.

    14. The Zafi Worm

    Zafi is a worm that first appeared in 2004. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that says “Hi!” and will contain an attachment that, when opened, will infect the computer with the worm.

    Zafi will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Zafi, and Microsoft released a patch to fix the security flaw that the worm exploits.

    15. The Gator Worm

    Gator is a worm that first appeared in 2006. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that says “Hi!” and will contain an attachment that, when opened, will infect the computer with the worm.

    Gator will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Gator, and Microsoft released a patch to fix the security flaw that the worm exploits.

    16. The Mytob Worm

    Mytob is a worm that first appeared in 2006. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    Mytob will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Mytob, and Microsoft released a patch to fix the security flaw that the worm exploits.

    17. The Bagle Worm

    Bagle is a worm that first appeared in 2004. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    Bagle will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Bagle, and Microsoft released a patch to fix the security flaw that the worm exploits.

    18. The Sober Worm

    Sober is a worm that first appeared in 2005. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    Sober will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Sober, and Microsoft released a patch to fix the security flaw that the worm exploits.

    19. Thenetsky Worm

    Thenetsky is a worm that first appeared in 2004. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    Thenetsky will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Thenetsky, and Microsoft released a patch to fix the security flaw that the worm exploits.

    20. The Bropia Worm

    Bropia is a worm that first appeared in 2006. It attempts to spread itself by emailing itself to people in the infected user’s address book. The email will have a subject line that is random, and will contain an attachment that, when opened, will infect the computer with the worm.

    Bropia will also create a copy of itself in any directory that contains files with certain extensions. This allows the worm to continue spreading even after it has been removed from the computer.

    Fortunately, there are also a number of removal tools available for Bropia, and Microsoft released a patch to fix the security flaw that the worm exploits.

    Removing a Virus

    If you think your computer has been infected with a virus, the first thing you should do is run a virus scan with an up-to-date anti-virus program. If the scan finds a virus, the anti-virus software will usually be able to remove it.

    In some cases, however, a virus may be too new and not yet be detectable by anti-virus software. In these cases, you may need to use a removal tool specifically designed for the virus.

    Once you have removed the virus from your computer, you should take steps to prevent it from infecting your computer again. This includes keeping your anti-virus software up-to-date and being careful about what you click on.

    We used malwarezero.org to write this article about most dangerous pc viruses. Click for source.

    Leave a Reply

    Your email address will not be published. Required fields are marked *