• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
HOT
Buzzy Flow
No Result
View All Result
  • Home
  • Animals
    Video: Jim Irsay on Life With His Dog, His ‘Blue Vegan’ Leather-Free Jet, and More

    Video: Jim Irsay on Life With His Dog, His ‘Blue Vegan’ Leather-Free Jet, and More

    Commonly asked questions about RVT’s

    Commonly asked questions about RVT’s

    Hold Onto Your Stripes!!!

    Endangered Fish Population Declines as 760k Gal Fire Retardant for Wildfires Dropped on California Waterways

    Endangered Fish Population Declines as 760k Gal Fire Retardant for Wildfires Dropped on California Waterways

    Whole Foods’ Ties to Monkey Labor to Have PETA Dumping Coconuts at Store

    Whole Foods’ Ties to Monkey Labor to Have PETA Dumping Coconuts at Store

    Working together to bring pet loss support to grieving families

    Working together to bring pet loss support to grieving families

    Spiky Bundle of Joy 

    Viruses From Poop Of Giraffes, Lemurs Can Be Used To Kill Drug-Resistant Bacteria, Study Says

    Viruses From Poop Of Giraffes, Lemurs Can Be Used To Kill Drug-Resistant Bacteria, Study Says

    ‘Don’t Leave Them,’ Says Danai Gurira: Hot Cars Are Fatal for Dogs

    ‘Don’t Leave Them,’ Says Danai Gurira: Hot Cars Are Fatal for Dogs

  • Buzz
    David & Victoria Beckham Talk Affair Allegations On Netflix

    David & Victoria Beckham Talk Affair Allegations On Netflix

    Great British Bake Off Premiere Animal Cakes Side-By-Sides

    Great British Bake Off Premiere Animal Cakes Side-By-Sides

    Anya Taylor-Joy Marries Malcolm McRae In Beige Wedding Dress

    Anya Taylor-Joy Marries Malcolm McRae In Beige Wedding Dress

    Easy To Make TikTok Sorbet That’s Only 2 Ingredients

    Easy To Make TikTok Sorbet That’s Only 2 Ingredients

    Actors Who Gained And Lost Weight For Roles

    Actors Who Gained And Lost Weight For Roles

    19 Poor Souls Who Just Had A Week That Was Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way Worse Than Yours

    19 Poor Souls Who Just Had A Week That Was Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way Worse Than Yours

    Sia Shows Off Facelift

    Sia Shows Off Facelift

    I Reviewed New 2023 Trader Joe’s Pumpkin Products

    I Reviewed New 2023 Trader Joe’s Pumpkin Products

    17 Actors Who Tried To Get Their Costars Fired

    17 Actors Who Tried To Get Their Costars Fired

  • Celebs
    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    Celebrity couples who have been together for a long time including Tom Hanks and Rita Wilson, Keith Urban and Nicole Kidman and more

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Ke Huy and Echo Quan Relationship Timeline

    Ke Huy and Echo Quan Relationship Timeline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    11 Best Perfumes for Men in the World

    11 Best Perfumes for Men in the World

    Jamie Lee Curtis Praised the Star – StyleCaster

    Jamie Lee Curtis Praised the Star – StyleCaster

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

  • Life
    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    Celebrity couples who have been together for a long time including Tom Hanks and Rita Wilson, Keith Urban and Nicole Kidman and more

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Ke Huy and Echo Quan Relationship Timeline

    Ke Huy and Echo Quan Relationship Timeline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    11 Best Perfumes for Men in the World

    11 Best Perfumes for Men in the World

    Jamie Lee Curtis Praised the Star – StyleCaster

    Jamie Lee Curtis Praised the Star – StyleCaster

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

  • Tech
    Canva’s New AI Design Tools Aim to Help You Create and Edit Like a Pro

    Canva’s New AI Design Tools Aim to Help You Create and Edit Like a Pro

    Generative AI Is the Newest Tool in the Dictator’s Handbook

    Generative AI Is the Newest Tool in the Dictator’s Handbook

    Samsung Galaxy S23 FE, Tab S9 FE, Buds FE (2023): Features, Specs, Price

    Samsung Galaxy S23 FE, Tab S9 FE, Buds FE (2023): Features, Specs, Price

    ChatGPT Vision lets you submit images in your prompts: 7 wild ways people are using it

    ChatGPT Vision lets you submit images in your prompts: 7 wild ways people are using it

    OnePlus Open: all the news and rumors about the company’s first foldable

    OnePlus Open: all the news and rumors about the company’s first foldable

    Tom Hanks warns of AI-generated ad using his likeness

    Tom Hanks warns of AI-generated ad using his likeness

    The Inner Beauty of Basic Electronics

    Creating Domestic Robots That Really Help

    A New Satellite Outshines Some of the Brightest Stars in the Sky

    A New Satellite Outshines Some of the Brightest Stars in the Sky

    AI assistants boost productivity but paradoxically risk human deskilling

    AI assistants boost productivity but paradoxically risk human deskilling

  • Video
    • All
    • Cooking
    • Fitness
    • Gaming
    • Lifestyle
    • Music
    • Podcasts
    • Travel
    • Vlogs
    BiggBossBuzzz – Watch Geetu's Exclusive Interviews on Recent Bigg Boss Evictions | Daily 10AM & 6 PM

    BiggBossBuzzz – Watch Geetu's Exclusive Interviews on Recent Bigg Boss Evictions | Daily 10AM & 6 PM

    100 Rupees Useful Gadgets #shorts #gadgets

    100 Rupees Useful Gadgets #shorts #gadgets

    Guli Happy lifedan Samarqandcha mehmondorchilik🍲🧡🫶🏻

    Guli Happy lifedan Samarqandcha mehmondorchilik🍲🧡🫶🏻

    Cute little cat 😺 animals 2022 video catvideos

    Cute little cat 😺 animals 2022 video catvideos

    Zoo – Happy Animals – level 1, 2

    Zoo – Happy Animals – level 1, 2

    DRX BuZz insane 1v3 clutch vs ASE | VCT Masters Tokyo

    DRX BuZz insane 1v3 clutch vs ASE | VCT Masters Tokyo

    6 vivo Tech Will Blow Your Mind #vivoTechDay #shorts

    6 vivo Tech Will Blow Your Mind #vivoTechDay #shorts

    happy life status | happy quotes | #viral #shorts #youtube

    happy life status | happy quotes | #viral #shorts #youtube

    Buzz Designed The New Space Ranger Suits!

    Buzz Designed The New Space Ranger Suits!

Buzzy Flow
No Result
View All Result
Advertisement Banner
Home Tech

The 10 Worst Computer Viruses in History

buzzyflow by buzzyflow
October 28, 2022
in Tech
0 0
0
The 10 Worst Computer Viruses in History
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


Computer code in the shape of a skull on a screen
solarseven/Shutterstock.com

Computer virus: Those two words instantly make us sweat—and for good reason. Since the 1980s, viruses have wreaked havoc on everything from our inboxes to industrial facilities. While cybersecurity has improved, the damage done by viruses throughout history is a reminder of what these bugs can do.

Picture it: It’s 1986, and you see a message on your Windows PC saying your computer is infected with a virus. To remedy the situation, you’re instructed to call brothers Basit and Amjad Farooq Alvi. At that moment, as you pick up your phone and start to dial, you immediately regret pirating the brothers’ software (as you should).

The virus was known as Brain, the first PC virus. It was technically built for the protection of software. However, the good intentions didn’t last. Soon, viruses were malicious in nature, resulting in billions of dollars of damage, identity theft, wrecked hardware…the list goes on.

Millions of viruses have existed since Brain in 1986. However, some have been considerably worse than others.

Melissa – 1999

In 1999, computer viruses were still a relatively new concept. However, the Melissa virus, known as the fastest-growing virus of that time, quickly highlighted them as a growing concern for all.

It all started when a man named David Lee Smith used an AOL account to upload a file to the internet that, when downloaded, would hijack early versions of Microsoft Word. If a user also had Microsoft Outlook, the virus would send itself via email to the top 50 people in a user’s address book.

While that may not seem like that big of a deal, it was. According to the FBI, many corporate and government email servers became overloaded and had to be shut down. In addition, internet traffic slowed to a trickle.

This virus did have a happy ending. A few months after David Lee Smith was sentenced for his crime, the FBI developed its Cyber Division, which still investigates cyber crime to this day.

ILOVEYOU – 2000

Who doesn’t want to find a love letter in their inbox? Unfortunately, many Romeos and Juliets in 2000 fell victim to a virus after clicking what looked like a love letter in Microsoft Outlook.

The ILOVEYOU virus (known as Love Bug back then) was technically a worm and started as a seemingly innocent email. The subject line, “ILOVEYOU,” drew email users to click. Inside, a text file titled “LOVE-LETTER-FOR-YOU.TXT.VBS” was waiting.

Once the text file was opened, the worm would go on to permanently damage files such as photos and critical documents on a user’s computer. Even worse, it would attach itself to all the addresses in Microsoft Outlook, spreading like wildfire.

As a worm, no further human intervention was required to keep ILOVEYOU moving. As a result, millions of computers became infected in only a matter of days.

Code Red – 2001

Computer screen with potential virus
Audrius Merfeldas/Shutterstock.com

One of the more ominous-sounding viruses on our list, Code Red took over corporate IT in 2001. In fact, it’s regarded by many as the first severe attack on a corporate system.

The Code Red worm specifically targeted systems running Microsoft Internet Information Services (IIS) for Windows Server. As described in a Microsoft Security Bulletin, the attacker could use an unchecked buffer, establish a server session, conduct a buffer overrun, and execute code on the web server.

The result? Important websites would display “Welcome to http://www.worm.com! Hacked by Chinese!” and nothing else. The worm was also the cause of various dangerous denial-of-service (DoS) attacks.

But that ominous-sounding name? It was inspired by the drink the security employees were sipping when they found the worm: Mountain Dew Code Red.

Nimda – 2001

Nimda struck just a few months after Code Red and just a short time after the September 11th attacks that left us in shock. As a worm, Nimda was similar to ILOVEYOU and Code Red in that it replicated itself.

However, Nimda was particularly damaging as it was able to spread in various ways, including via email and compromised websites. Nimda affected Windows operating systems and was able to modify system files and even create guest accounts.

Due to Nimda, millions of machines were infected, and many large corporations had to shut down their networks and operations. The actual cost of Nimda has yet to be fully estimated. But trust us when we say it’s a lot.

Sobig – 2003

Person using a laptop displaying an email inbox
Tero Vesalainen/Shutterstock.com

While opening an email may not lead to infection, email attachments are a whole other can of worms (pun intended). Opening weird attachments from email addresses you don’t recognize is a big no-no. And while many email users today know this, things were different in 2003.

The Sobig worm infected millions of Microsoft computers via email. The threat would arrive in your inbox with a subject line like “Details” or “Thank you!” And inside, there would be an attachment just begging for a click.

When clicked, Sobig would infect the computer, search for other email addresses in various computer files, and then quickly replicate by sending itself to those addresses.

What’s worse, Sobig had multiple variants, including A, B, C, D, E, and F. The “F” variant was by far the worst of the group. In August of 2003, it was reported that one out of every 17 emails was a copy of the Sobig.F virus.

Due to its spreading capabilities, Sobig overwhelmed networks worldwide and resulted in billions of dollars in damages.

Mydoom – 2004

“I’m just doing my job, nothing personal, sorry.”

This was the email message sent by the email worm, Mydoom, first discovered in 2004. And a job it did, indeed. Mydoom quickly became the fastest-growing email worm in history. In fact, it still holds the title.

Similar to Sobig and other worms on this list, Mydoom was primarily spread through email attachments. If the attachment was opened, the worm would send itself to other email addresses found in the user’s address book or other local files.

The fast growth of Mydoom slowed internet traffic worldwide. At the time, it was reported that some websites were experiencing response times 8 to 10% lower than the average. Mydoom was also behind multiple DoS and DDoS attacks, including attacks against the US and South Korea.

Zeus – 2007

Zeus, also known as Zbot, is trojan malware infecting Microsoft Windows. The malware most commonly targets financial or banking information. The first sighting of Zeus was in 2007, when the malware was found stealing information from the US Department of Transportation.

Zeus works by developing a botnet, which is a network of remote-controlled computers or bots that have been infected by malware. As a result, an attacker can control multiple computers at once. Zeus often infects a computer after a user clicks a malicious link in an email or downloads an infected file.

Why is Zeus so dangerous? For example, the malware can use keylogging to capture sensitive information such as online banking passwords. In fact, in 2010, the FBI busted a crime ring that used the Zeus trojan to steal around $70 million from its victims.

Stuxnet – 2010

Stuxnet made headlines in 2010 as the first worm developed to target industrial control systems. The worm inflicted physical damage on Iran’s nuclear facilities, particularly centrifuges. How? By exploiting vulnerabilities found within Windows to gain access to the software used to control the industrial equipment.

Stuxnet was also unique in that the worm was first introduced to computers using infected USB drives. Yes, physical USB drives. Even now, Stuxnet is hailed as the world’s first cyberweapon.

PoisonIvy – 2011

PoisonIvy does more than make its victims itch. Known as a backdoor trojan or remote access trojan (RAT), PoisonIvy is used to gain access to a victim’s computer. While PoisonIvy isn’t a virus but a type of malware, it deserves a place on our list nonetheless.

PoisonIvy was first identified in 2005. However, one of the most notable attacks using the trojan occurred in 2011. Known as the Nitro hacking attacks, PoisonIvy was used to steal critical information from chemical manufacturers, government agencies, and other organizations.

PoisonIvy is dangerous because threat actors can access a computer for keylogging, screen capturing, and more. The trojan is also used to steal passwords and other critical personal information.

WannaCry – 2017

Wannacry-like virus window
Nice Scene/Shutterstock.com

The WannaCry ransomware attack took place in May 2017. The goal was simple: to hold a user’s files hostage and get paid in Bitcoin.

The WannaCry attack used a leaked hack known as EternalBlue to gain access to computers running Microsoft Windows. Once in, WannaCry would encrypt the computer’s data. Then, users would see a message demanding a Bitcoin payment for the release of their files.

Unfortunately, WannaCry did have its victims. In 2017, the damage was estimated to be in the billions. Even today, WannaCry still exists, highlighting the importance of protecting ourselves from ransomware.

The Computer Virus Is Alive and Well

As technology evolves, so does the work of cybercriminals. While you may see the years listed above and get the impression that viruses are a thing of the past, that couldn’t be further from the truth.

Serious threats such as ransomware are alive and well. The best thing you can do? Protect yourself. Even the most basic security practices can help prevent viruses from infecting your devices.





Source_link

Advertisement Banner
buzzyflow

buzzyflow

Trending Posts

العاب # الفيل الصغير 😹😅🙂🐘🐘الحيوانات السعيدةZoo – Happy Animals
Video

العاب # الفيل الصغير 😹😅🙂🐘🐘الحيوانات السعيدةZoo – Happy Animals

by buzzyflow
April 17, 2023
0

source

Read more
Twins! San Antonio Zoo Welcomes Adorable Cotton Top Tamarin Twins

Twins! San Antonio Zoo Welcomes Adorable Cotton Top Tamarin Twins

January 15, 2023
7 False Beliefs That Will Keep You Trapped in Your Head Forever

7 False Beliefs That Will Keep You Trapped in Your Head Forever

January 23, 2023
On TikTok and YouTube, Here’s Why Quitting Videos Go Viral

On TikTok and YouTube, Here’s Why Quitting Videos Go Viral

March 9, 2023
How to Make Thai Curry Pasta

How to Make Thai Curry Pasta

May 12, 2023
The Amazing World of Wheelchair Tennis

The Amazing World of Wheelchair Tennis

March 29, 2023

Buzzy Flow

Welcome to Buzzy Flow The goal of Buzzy Flow is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Animals
  • Buzz
  • Celebs
  • Cooking
  • Fitness
  • Gaming
  • Life
  • Lifestyle
  • Music
  • Podcasts
  • Tech
  • Travel
  • Video
  • Vlogs

Recent Post

  • The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!
  • BiggBossBuzzz – Watch Geetu's Exclusive Interviews on Recent Bigg Boss Evictions | Daily 10AM & 6 PM
  • Video: Jim Irsay on Life With His Dog, His ‘Blue Vegan’ Leather-Free Jet, and More
  • David & Victoria Beckham Talk Affair Allegations On Netflix
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2022 Buzzyflow.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Animals
  • Buzz
  • Celebs
  • Life
  • Tech
  • Video

Copyright © 2022 Buzzyflow.com | All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT