Advanced Cyber Security

Resources / IT Security Technical Part2 /

Top 10 Viruses

Learn more about the TOP 10 viruses.

It is very important not to open malicious attachments in emails or click links that could be false. Always make sure you have an updated anti virus on Windows, Mac OS X.

Even though users nowadays rely on anti-virus packages, firewalls, or security software suites to contain most of the latest virus outbreaks, there have been quite a number of malware that has reached global, pandemic levels of financial loss and information damage.

All the same, here's a look at the top ten worst viruses, Trojans, worms, and malware that has unleashed digital destruction of plague-like proportions.

1. Nimda: This combo-platter programmer

System was the whole of all malware-based reasons for alarm; i.e., it was a Trojan, an infection, and a worm in one bundle.

This terrible minimal mixture was equipped for contaminating your PC in various ways.

It additionally figured out how to turn into the world's most common infection at the time in under an hour after it was unleashed on the web.


Hands down, this was a standout amongst the most ruinous malware ever made by man. A huge number of PCs were traded off and about the same measure of dollars were lost by this infection that took cover behind an email and took on the appearance of an adoration letter.

This is the one infection that could claim to have close down the PC systems of the Pentagon and CIA amid its prime.

3. Code Red

This is yet another exceedingly broad and harming infection (which was, unexpectedly, named after a brief Mountain Dew variation) that has tainted upwards of three hundred sixty thousand PCs in only one day. It's additionally the most troublesome infection to evacuate in a framework, on the grounds that it can without much of a stretch re-contaminate a machine that has recently been cleaned.

The measures of assets and IT work force time it ate up were additionally amazing.

4. Slammer

This malware has been depicted by specialists as a colossally brisk spreading PC worm that is equipped for contaminating the most uncovered and powerless has inside of minutes of its organization.

This byte-sized malware dread had the capacity contaminate more than seventy-five thousand machines worldwide after it was dispatched on January 25, 2003.

5. Blaster

Although it wasn't the most risky worm on the planet as a result of its coding imperfections, it was still a standout amongst the most advertised up and overexposed malware projects ever in view of the colossal measures of consideration the media provided for it.

An overhauled variation of this worm was made by an eighteen-year-old programmer named Jeffery Lee Parson, which immediately contaminated more than fifty thousand machines around the world.

6. Morris Worm

Robert Morris' 1988 Morris Worm was one of the first worms ever constructed.

It was truly a scandalous accomplishment for malware made by a Cornell graduate understudy on the grounds that it eventually prompted its maker's conviction under the Computer Fraud and Abuse Act (Morris was the first man indicted under that demonstration, actually).

7. Welchia

This is accepted to be a standout amongst the most unconventional worms in PC history on the grounds that it was produced by a white cap programmer to really get out the constantly developing Blaster worm contamination before erasing itself. As a result, it can be viewed as the first (and likely just) positive, non-dangerous worm ever made.

8. Commwarrior-An

Experts accept this infection to be the following intelligent stride in malware advancement.

More to the point, the infection hit with exemption on the mid year of 2005 in a region that was minimum expected: cellular telephones. The main cellphone infection was just ready to spread to sixty telephones through instant messages, yet it could turn out to be the begin of a cell phone malware flare-up.

9. Elk Cloner

This was a generally innocuous floppy circle infection written in 1982 by a secondary school understudy.

It particularly focused on Apple II PCs and it simply brought on influenced machines to demonstrate a sonnet composed by its producer on every fiftieth boot.

10. Creeper

Considered by numerous PC history specialists to be the first PC infection ever constructed, the Creeper had the capacity contaminate PDP-11 machines connected to ARPANET (the Defense-Department-made Internet ancestor).

This self-recreating yet considerate (all it made the PC do was presentation the message, "I'm the creeper, get me in the event that you can!") infection was an antecedent to today's inevitable malware pestilence.

Pricing Click Here ->

Buy from a VAR or VAD Click Here ->

Get a Free Vulnerability Scan Click Here ->

Ingenco2 Trustmark SecPoint Trustpilot Emaerket

➤ Related Pages

Anti Denial of Service Tips & Tricks
Anti Phishing Tips & Trick
Anti Social Engineering Tips & Tricks
Anti Spam Tips & Tricks
Anti Spyware Tips and Tricks
Anti Virus Tips & Trick
Better WiFi Range
Protect Against Client Wireless
Risks of Cyber Crime
SecPoint Free Security Scan
Security Mailinglist Rss Feeds
Top 10 Hacker Attacks
Top 10 IT Security Tips
Top 10 IT Security Tools
Top 10 Myths in IT Security
Top 10 Phishing Scams
Top 10 Secure Operating Systems
Top 10 Social Engineering Tactics
Top 10 Spam Attacks
Top 10 Spyware
Top 10 Viruses
Top 10 Ways to Protect
Top 10 Website Security Myths
Top 10 Worms
Top 26 Hackers