- Vivo X21 | Specifications | Features | Price | Rating | Comparison
- State wise list of Bio - sphere reserved | Tiger reserves in India.
- Top 10 Most Superhit Bollywood movies of 2018 | Budget | Starring | Songs | Rating | Posters
- How To safety from dehydration | Causes | Effects | Symptoms | Prevention | Signs
- Daru Band Latest New Punjabi Song | Mankirt Aulakh | Lyrics | Video | Poster | Best songs
Top 6 computer virus dangerous
Now – a – days, the maximum work of the world were shift on international network ( internet ) . The main sources to ride the internet is computer. The other source is phones .Today, people’s are like the online works rather than offline work. This is because, on internet to do the work easily. But , the main problems in online work is computer virus. It is that type of impurity who hack the computers. Erase everything like images , music , videos , documents etc.
There are top six dangerous computer virus on world are. :-
1. I Love you
This was perhaps the most dangerous computer virus ever. It created that was in the form of a worm. It was a stand alone program capable of replicating itself. Known as I LOVE YOU, this virus initially traveled the internet by e-mail. Managed to crash PCs all across the world. To make it even more alluring. The subject of e-mail said that. The message was a love letter from a secret admirer.
An attachment in the e-mail was that caused all the trouble. The original worm had the file name LOVE LETTER – FOR – YOU. TXT. vbs. The moment someone opened the file. The virus e-mailed itself to the first 50 contacts. Available in the PCs Windows address book. The virus caused a total damage of around $ 10 billion affecting. Almost 10% of the world’s PCs connected to internet.
It was the first mass mailing macro virus. For the new age of e – mailing which became the breaking news. Across the world on March 26, 1999. Based on a Microsoft word macro and built by David L, Melissa. It was spread in the form of an email attachment by the name “list. doc” .
When the attachment was clicked upon , the computer virus replicates itself and seeks for the Microsoft Outlook address book to e-mail its-elf to the first 50 names on the list with a message , ” Here is that document you asked for ….. don, t show any-one else “. Later on, FBI arrested David L and slapped him with a fine of $5000 for unleashing the fastest virus of its time.
3. My Doom
It explored its way to the malware world on january 26 , 2004 and sent a shockwave around the wor-ld , as it scattered exponentially via e-mail through email with random addresses of senders and subject lines . My Doom destroyed the cy-ber World by activating a tremen-dous denial of service attack that infected close to about two milli-on PCs.
It transmitted itself in particularly deceitful manner through e-mail as what receiver would first reckon to be bounced error mess-age as it reads “Mail Transaction Failed”. But, as soon as the message is clicked upon the attachment is executed and the worm is trans-ferred to email addresses found in user’s address book. The damage caused by this fastest spreading mass mailer worm was a whop-ping $38 billion.
4. Code Red
It debuted in late 2001 talking adv-antage of the Microsoft internet in-formation server flaw. The variation of the computer virus is, it did not require you to open an e-mail attachment or run a file, it just required an active internet connec-tion with which it ruined the web page that you opened by displaying a text “Hacked by Chinese”!
And in less than a week, s time. It brought down more than 4, 00, 000 servers including the white House web server. This virus caus-ed a total damage of approximat-ely $2. 6 billion dollars by hitting almost one million PCs.
The 2004 worm virus affected win-dows OS primarily, and was devast-ating to many critical infrastructure. It didn, t spread through e-mail un-like other viruses. Instead, once the viruses infected a computer, it look-ed for other vulnerable systems. It contacted those systems and instru-cted them to download the virus. The virus would scan random IP addresses to find potential victims.
The virus also altered the vic-tim operating system in a way, ma-king it even hard to reset with-out cutting the power. Sasser functioned by attacking the security controller Local Security Authority Subsystem Service as it had a buffer overfl-ow vulnerability. The worm affected hospitals , public transportation, air-lines , news agencies and much mo-re. After one million infections, the-re was an estimated 18 billion do-llars in damage recorded.
It is a subset of malware in which the data on a victim, s computer is locked , typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motive for ransomware attacks is nearly always monetary, and un-like other types of attacks, the victim is usually noticed that an exploit has occurred and is given instructions for how to recover from the attack. Payment is often demanded in a virtual currency, such as bitcoin, so that the cyber criminal ,s identity isn, t known.