Ads
related to: famous computer virus attacksantivirusguide.com has been visited by 100K+ users in the past month
- #1 Best Antivirus 2025
See Which Antivirus Is Rated 1st
Get The Best Antivirus of 2025
- Best Windows Antivirus
Get The Best Windows Antivirus
That Is Right For You!
- Top 10 Antivirus
See The Top 10 Antivirus Software
Make Your Device Safe To Use!
- Best Antivirus Software
Find The Best Antivirus Software
Trusted Comparison & Reviews
- #1 Best Antivirus 2025
Search results
Results From The WOW.Com Content Network
Hex dump of the Blaster worm, showing a message left for Microsoft co-founder Bill Gates by the worm's programmer. This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.
Shamoon, a modular computer virus, was used in 2012 in an attack on 30,000 Saudi Aramco workstations, causing the company to spend a week restoring their services. [3] [4] Wiper – In December 2011, the malware successfully erased information on hard disks at the Oil Ministry's headquarters. [5] [6]
Most known for being the first virus targeting Mac computers. Morris: November 2, 1988 Robert Tappan Morris: Widely considered to be the first computer worm. Although created for academic purposes, the negligence of the author unintentionally caused the worm to act as a denial of service attack.
ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". [1]
The city of Albany in the U.S. state of New York experiences a ransomware cyber attack. [127] [128] April: Computer systems in the city of Augusta, in the U.S. state of Maine, are seized by hackers using ransomware. [129] [130] The City of Greenville (North Carolina)'s computer systems are seized by hackers using ransomware known as RobbinHood.
Exploit (computer security) – Method of attack on computer systems; Industrial espionage – Use of espionage for commercial purposes rather than security; Hardware Trojan – Malware embedded in hardware; harder to detect and fix than software vulnerabilities; Phishing – Form of social engineering