A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Top Ten Viruses

CIH​
CIH​

CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows 9x computer virus which first emerged in 1998. Its payload is highly destructive to vulnerable systems, overwriting critical information on infected system drives, and in some cases destroying the system BIOS.

image: youtube.com
Anna ​Kournikova​
Anna ​Kournikova​

The Anna Kournikova Virus was a worm that spread by email, disguised as an email attachment with the filed name “AnnaKournikova.jpg.vbs.” The virus was a Visual Basic script that, once opened, emailed itself to all the contacts within the user's Outlook address book.

ILOVEYOU​
ILOVEYOU​

The ILOVEYOU virus comes in an email note with I LOVE YOU in the subject line and contains an attachment that when opened results in the message being r...

Melissa​
Melissa​

Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Outlook e-mail program, causes the virus to be resent to the first 50 people in each of the user's address books.

Blaster​
Blaster​

Blaster Worm (also known as Lovsan, Lovesan or MSBlast) is a computer worm that spread on computers running operating systems Windows XP and Windows 2000, during August 2003. The worm was first noticed and started spreading on August 11, 2003.

Netsky​
Netsky​

Netsky is a prolific family of computer worms which affect Microsoft Windows operating systems. The first variant appeared on Monday, February 16, 2004. The "B" variant was the first family member to find its way into mass distribution.

Sasser​
Sasser​

Sasser was first noticed and started spreading on April 12, 2004. This worm was named Sasser because it spreads by exploiting a buffer overflow in the component known as LSASS (Local Security Authority Subsystem Service) on the affected operating systems.

Trojan Horse​
Trojan Horse​

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Storm Worm​
Storm Worm​

Antivirus companies call the worm other names. For example, Symantec calls it Peacomm while McAfee refers to it as Nuwar. This might sound confusing, but there's already a 2001 virus called the W32.Storm.Worm. The 2001 virus and the 2006 worm are completely different programs. The Storm Worm is a Trojan horse program.

image: tes.com