The Internet, a world of unlimited possibilities, you can shop, book a trip to Sunny Beach, watch movies, listen to music, take care of all your banking and maybe even pick up a deeply Saturday night by using Internet. The Internet has become an indispensable part of our daily lives both at home and at work and the rapid development of the Internet is further reinforced by the spectacular sturgeon the number of internet users, you have a high-speed internet connection by ADSL Cable. This is resulting in a growing number of people who are continuously online. The Internet is indeed opened up a world of unlimited possibilities but that also brought a growing number of threats. Not only the proper use of Internet is growing the misuse and abuse of the medium is also growing at an alarming rate. Yes, we are going to learn about computer viruses and types of computer viruses
There are countless computer viruses and worms that use the latest text to force their way into your computer. The computer viruses are called viruses because they are similar to biological viruses. As the biological viruses passes from one person to another, similarly computer viruses also passes from one computer to another. They often get into a PC silently without you even knowing that are there. But once they are actually in your PC they can create terrific destruction. Your computer is like you home, unwanted guests can break into a home on your computer at any time and in any way. Often without you even seeing or noticing them. Emails for example, can provide an entry way for viruses to penetrate your computer. You will simply receive an email with an attachment that perks your interest. Your curiosity gets the better of you and you will open the attachment and quest to the viruses that barges in and has unlimited access to every nook and cranny of your PC. These viruses are also experts in spreading and multiplying by all the addresses in your mail box but the emails aren’t the only way that viruses get into your PC. Actually every time you visit a website or download free music or video files you can contaminate your pc with dangerous installations or downloads. But viruses can do much more. They are so clever that they weak all this havoc entirely on their own, they don’t need your help, all they need is your PC and the rest takes place automatically.
Worms another group of nasty intruders can also spread at devastating speed. Worms cleverly use the leaks in your computer programs to enter into your computer whenever your PC is connected to the internet, even if you aren’t at home. you could say that doom act as door man but the only problem is that they let in all kinds of unsavory characters that you would actually like to keep out and if you could see them you would be horrified at the riff-raff that walk straight through the door. Of all the intruders, BOT are without a doubt the most ruthless. They install themselves on your computer often with the aid of a virus or worm and as it were hypnotize your computer. From this moment you are the owner of a Zombie PC. Once your PC is infected with the BOT, it becomes part of the menu branch network of a zombie PCs. all infected with the same BOT creates a BOT NET.
It’s annoying for you and dangerous for others, a breeding ground for criminal offenses. From one central point just one malicious person can order all the bots in the network to carry out the same task. For example to paralyze the company’s network or website and they sent more than fifty percent of all the spam sent worldwide. The repercussions have been attacked by a network or obviously immensely greater, more effective and more damaging attack from an individual PC. So if you don’t protect your computer against bots it can unwillingly take part in a collective attack of this nature and while all of this is taking place and you probably won’t notice a thing. Your PC will appear to operate normally but behind the scenes it will be working overtime to carry out all kinds of undesirable activities. All of this being pretty discouraging picture just when you were feeling so positive about the endless possibilities provided by the internet and your computer. But the good news is that it’s not as complicated as its sounds.
How to prevent computer viruses by following just four simple rules:
RULE ONE: Install an anti-virus program and update it regularly.
RULE TWO: Install a firewall.
RULE THREE: Install the latest security updates for your software’s and operating systems, intruders like the old versions.
RULE FOUR: Don’t open email attachments that you do not trust.
Effective security start with recognizing the culprits and installing the required security yourself will help to keep your PC safe and secure.
Types of Computer viruses: Top 15 List
15. CRYPTO LOCKER – Ransom ware Trojan Type
In September 2013, a Ransom ware Trojan started infecting Microsoft Windows and was observed by Dell Secure works. Crypto Locker was spread via email attachments on an existing BOT NET. After encrypting files on the infected PCs, the virus would then display a message that offered to decrypt the data for a payment in either Bit coin or pre-paid cash voucher. Operation Tovar, an international collaboration, managed to isolate Crypto Locker in May 2014. Never the less, the creators were believed to have extorted around $3 million.
14. ANNA KOURNIKOVA – VBS Worm Type
In 2001, a Dutch programmer created a worm virus, which tricked recipients into opening a message that strongly suggested they would get a personal glimpse of Anna Kournikova. The tempted recipients would then trigger a malicious program that plundered their Outlook address book. The virus would then forward itself to every address it found. The flood of emails it unleashed paralysed servers all over the world. It became so notorious it even featured in an episode of Friends.
13. SASSER & NETSKY – DoS Worm Type
Created by a 17 year old boy named Sven Jaschan and released on his 18th Birthday. Sasser and Netsky were first discovered in 2004. Sasser attacked through a Microsoft Windows security weakness making it difficult to use and shutdown a PC, while Net sky went through emails with spoofs, causing DoS attacks through huge volumes of traffic. Sven later claimed to have written the Net sky worms in order to remove infection of the MYDOOM virus from victim’s computers. On July 8 2005, he received a 21 month suspended sentence. He later received 3 years probation and 30 hours community service in a retirement home.
12. kLEZ – Multi Vector virus Type
Appearing first in October 2001, the Klez virus spread through emails. There were a number of variants that plagued the internet for several months, some acting as worms and some as Trojans. It could disable anti-virus software and then pose as a virus-removal tool. As it spread, some hackers adapted it to be more effective. It ransacked address books and could be programmed to spam recipients with multiple emails.
11. CONFLICKER – Worm Type
In 2008 a super virus appeared. Conflicker infected millions of computers worldwide including government, business and home PC’s in over 200 countries, making it one of the largest known computer viruses in history. With the ability to crack admin passwords and copy itself to USB drives, it caused considerable panic, as it infected many high security networks including the French Navy, forcing aircraft to be grounded. The UK Ministry of Defence reported it had spread onto NavyStar desktops, aboard Royal Navy warships and submarines.
10. CIH “Chernobyl” – Virus
CIH, also known as Chernobyl, first appeared in 1998. It is one of the most damaging viruses, overwriting information and in most cases overwriting the system BIOS. The virus was spread via an infected firmware update to Yamaha CD drives and a demo version of the Activision game SiN. Causing damages in the region of $1 billion, the virus is still around although it only infects Windows 95, 98 and ME.
9. NIMDA – Multi Vector worm type
Just one week after the events of 9/11, a new virus emerged. Nimda (admin spelt backwards) was the fastest replicating attack of its time. Becoming the internet’s most widely spread worm within just 25 minutes of its release. It slowed down entire networks, causing many systems to crash entirely. Due to the timing of it discovery, it has been speculated that it was created by a government or terrorist organization.
8. LEAP.A – Trojan horse virus
In general most MAC users feel relatively relaxed about the safety of their machines. Because Apple produce both hardware and software, the systems are far more closed than PCs. However in 2006 hackers got in through the iChat instant messaging program, with a corrupted file that looked like an innocent JPEG. As MACs become more common place, expect more attacks on their integrity.
7. STORM – Trojan DoS Worm type
Surfacing in 2007, Storm Trojan infected thousands of computers. Users would be lured into opening emails with subjects such as ‘230 dead as storm batters Europe’ and ‘Naked teens attack home director’. Once the attachment was opened the Trojan implanted a service that passed data to other infected computers, each becoming a zombie in a Bot Net, a huge global network of computers enslaved by Storm Trojan. Each computer attempting to infect others, with the aim to control the processing power of every single PC on the planet. It was eventually contained but only after millions of man hours trying to halt its activity.
6. MELISSA – Macros virus
Created by David L Smith who named it after a Miami based stripper, Melissa was ironically not designed to create harm. However it spread so quickly that it overloaded servers. Melissa was spread via a file that contained passwords for 80 pornographic websites to a Usenet group called alt.sex. As soon as the email recipient opened the file it would attempt to email itself to the first 50 email addresses it could take from the computer. The FBI reported it as ‘wreaking havoc on government and private sector networks’. Smith was fined $5,000 and served 20 months in jail.
5. SQL SLAMMER – DoS worm
In 2003 SQL Slammer, also known as Sapphire hit the net. Doubling its infections every few seconds, the Slammer virus infected nearly half the internet servers in just 15 minutes. Its main targets were companies running SQL servers. Amongst many other high profile victims, it managed to bring down the Bank of America’s ATM system, disrupted part of Seattle’s emergency services and caused Continental Airlines to cancel several flights. Causing damages in the region of $1.2 Billion and infecting 200,000 PC’s.
4. CODE RED -DDoS worm
In the summer of 2001, two employees at eEye Digital Security discovered a new virus. While drinking Code Red Mountain Dew at the time, they decided to call this new virus, Code Red. The virus defaced many websites with the message ‘Hacked by Chinese’. Causing damages of $2.6 Billion and infecting over 1 Million PCs, this virus would launch DDOS attacks on several fixed IP addresses. The highest profile victim being the White House.
3. ILOVEYOU – VBScript Virus
If you received an email labeled ‘I LOVE YOU’, would you open it? Well, over 500,000 people did. In the year 2000 this virus surfaced just after Melissa hit computers world-wide. It was a standalone programme sent via email with the title I LOVE YOU. The virus would email itself to the first 50 contacts in the users address book and embed itself deep into the computer copying itself many times. It would then download a file that stole passwords and secretly emailed the information to hackers. Causing damages of $15 Billion doesn’t seem very loving.
2. SOBIG.F – Trojan worm
The SOBIG virus is considered one of the most destructive worms of its time. With many variants, none were more destructive than SOBIG.F, with damage of $37.1 Billion. This worm appeared only little more two weeks before Slammer and infected over 2 Million PCs world-wide. Sending itself in emails from ‘email@example.com’. SOBIG.F spread faster than any other email worm prior. Even with a bug in its code preventing local network infection, it managed to bring freight and computer traffic to a halt in Washington DC and grounded many of Air Canada’s flights.
1. MYDOOM – DDoS worm
The aptly named MYDOOM was the fastest spreading virus of all time and in February 2004 it was estimated to be infecting 1 in 12 emails with 100,000 interceptions taking place every hour. It spread through email and peer-to-peer networks enabling it to dig deep into the web. It manifested through an email attachment with titles such as ‘Mail Delivery System’ or ‘Mail Transaction Failed’. Naturally many people opened the attachment. Its aim was to assault Google, AltaVista and Lycos and at its peak managed to shut down Google for almost an entire day. Infecting over 2 Million PCs and causing damages of around $38 Billion. They never found the creator.
So with thousands of new computer viruses being discovered every day, many people wonder ‘Who is creating them?’ While others simply wonder ‘Who is making money from them?’