Computer viruses 2011 list




















A German newspaper allegedly claimed that this worm was combined plan of the US and UK for espionage and mass surveillance specially in Europe. There was no specific virus came into existence in the year , but a new way of hacking did, called SMiShing.

It can be seen as phishing by SMS, in this technique attackers send fraud SMS to victims mobile and tries to take the user to a fake website. Attacker Scrapes website on the internet to gather a list of Mobile Numbers. If the user opens the URL they get redirected to a phishing page asking for sensitive information.

As the name implies tiny banker Trojan is specifically designed virus for banking institutions. Actually, it is a modified form on Banker Trojan which came in the past, but it is much smaller in size, affective and more harmful.

Tiny Banker Trojan uses to identify the packet sniffing by which it analyses when a user is going to operate a bank account. During the process it extracts the useful info on the bank website like logo and title and make a pop up related to bank and ask their security numbers and codes. Tinba is programmed with 4 domains which it uses once any one of them is down, it converts host machine into the botnet and it can inject itself into system processes. So, here we wind up our list of top 10 computer viruses from to But one thing I noticed that this decade got most of the attack that try to steal the victims data or personal information, so we must be careful to protect ourself from these latest computer virus threats.

Protecting your computer from these attacks is easy and tough at the same time, if you are a tech savvy and stay careful about your actions on the internet then you can even run your system without installing any antivirus program. But most computer users are not that careful, that is why we go for various types of computer antivirus or all in one Internet Security suits. If you are not sure about the type of computer antivirus you should take, then let me suggest you one that I use for last 4 years.

As I have noticed that most of the time when a new virus comes into existence two security labs detect them first, which are:. I have never used F-Secure because it is not available in my region yet, but I am using Kaspersky Internet Security for years and I believe that it is the best security software till date. So, If you are also serious about protecting your machine and tasks performed over your machine from the above mentioned viruses then we recommend you to purchase Kaspersky Internet Security OR F-secure Internet Security today.

Leave comments below to let us know about any of your experiences with the harmful virus and how you managed to overcome with the infection. Your email address will not be published. Save my name, email, and website in this browser for the next time I comment. Notify me of follow-up comments by email. Notify me of new posts by email. Necessary cookies are absolutely essential for the website to function properly.

This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies.

It is mandatory to procure user consent prior to running these cookies on your website. Search for:. The file was uploaded using a stolen AOL account and with their help, law enforcement was able to arrest him less than a week since the outbreak began. He cooperated with the FBI in capturing other virus creators, famous among them the creator of the Anna Kournikova virus. A Windows worm first discovered in , it was created by computer science student Sven Jaschan, who also created the Netsky worm.

While the payload itself may be seen as simply annoying it slows down and crashes the computer, while making it hard to reset without cutting the power , t he effects were incredibly disruptive, with millions of computers being infected, and important, critical infrastructure affected.

The worm took advantage of a buffer overflow vulnerability in Local Security Authority Subsystem Service LSASS , which controls the security policy of local accounts causing crashes to the computer. It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically. This led to more than a million infections , taking out critical infrastructures, such as airlines, news agencies, public transportation, hospitals, public transport, etc.

Jaschen was tried as a minor and received a 21 month suspended sentence. Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man-in-the-browser keylogging and form grabbing.

The majority of computers were infected either through drive-by downloads or phishing scams. First identified in , it managed to compromise thousands of FTP accounts and computers from large multinational corporations and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts.

The entire operation was sophisticated, involving people from around the world to act as money mules to smuggle and transfer cash to the ringleaders in Eastern Europe. In late , the creator of Zeus announced his retirement but many experts believe this to be false. Also known as Downup or Downadup , Conficker is a worm of unknown authorship for Windows that made its first appearance in The name comes form the English word, configure and a German pejorative.

It infects computers using flaws in the OS to create a botnet. The malware was able to infect more than 9 millions computers all around the world, affecting governments, businesses and individuals. Vulnerabilities in Microsoft caused computer worms like Agobot and Bolgimo to spread easily.

It holds the record for the quickest spreading mass mailer worm. The Netsky worm spreads through emails by replicating itself to folders found on the local hard drive. The Whitty worm found holes in many Internet Security Systems related products. The Whitty worm was the first of its kind to spread rapidly through the internet. The Caribe was the first computer worm designed to infect mobile phones that had Symbian OS. It spread itself through Bluetooth.

Vundo is a Trojan horse that causes popups and advertising in some antispyware programs. It is also known for denying service with certain websites like Google. The first webworm called Santy used Google to find targets.

It infected nearly 40, websites before Google was able to filter the search query that the worm used in order to prevent it from spreading. It uses a hijacking method to get by firewalls and access the internet.

It tries to disable all security and file sharing related software in order to destroy files like Microsoft Office. In nearly 6 months it had infected close to 1. By September the numbers had reached millions. A trojan horse called Zeus steals banking information through a method called keystroke logging. It was a trojan that was traced to a digital photo frame. A trojan horse known as the Torpig affects Windows by shutting down any antivrus applications. This allows others to access the computer and change or steal any confidential information.

It also installs more malware onto the infected computer. The Conflicker computer worm infects 9 to 15 million servers systems Microsoft that were running on a variety of Windows, from Windows to Windows 7 Beta.

Servers from large government organizations like the UK Ministry of Defense were affected. Dozer follows a series of cyber attacks in the United States and South Korea. The Daprosy Worm steals passwords for online games. It would steal from internet cafes and intercept on all keystrokes. It is a very dangerous worm since it was affecting business-to-business systems. Anti-Spyware is a trojan horse that poses as an anti-spyware program.

It attacks newer Windows versions like Vista and XP. It blocks access to the internet for virus updates and completely disables security for antivirus programs. Just call or Email us! Call or Email! Easy to Use. Powerful Software. Priced Right. Try It Free! Contact Us. Easy Tutorials! Work Order Software. Advanced Modules. LG Optimus L7 is new android smartphone for middle class with luxury taste. Although less audible echo in Android phone competition, does n Facebook appointed Sheryl Sandberg as a director.

Sheryl currently serves as Chief Operating Officer becomes first woman on the board of dir The Difference BlackBerry Curve and By these companies, is referred to as the suc In a few days left to live again.

Various events occur throughout the year. Technological development was not to be outdone by the big events. Windows 8 , Kindle Fire , Opera Mini 6. Along with the development of these technologies, is growing well as a range of viruses and malware which is a disease of the technology. Various types of viruses hanging around throughout Starting from Stuxnet, Rammit, Webmoner, and several other types of viruses are quite tough to eradicate.

Here are some of the most dangerous type of computer virus that circulated during the year 1. Ramnit, is one of the viruses that have successfully replaced the role of Sality in early in the computer and infects executable files.

From January until now, have many computers have been infected with this virus. In addition Ramnit other viruses that spread in early that is Webmoner and FontAgent.



0コメント

  • 1000 / 1000