When.com Web Search

  1. Ads

    related to: famous computer virus attacks
  2. antivirusguide.com has been visited by 100K+ users in the past month

Search results

  1. Results From The WOW.Com Content Network
  2. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    Hex dump of the Blaster worm, showing a message left for Microsoft co-founder Bill Gates by the worm's programmer. This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

  3. List of cyberattacks - Wikipedia

    en.wikipedia.org/wiki/List_of_cyberattacks

    Shamoon, a modular computer virus, was used in 2012 in an attack on 30,000 Saudi Aramco workstations, causing the company to spend a week restoring their services. [3] [4] Wiper – In December 2011, the malware successfully erased information on hard disks at the Oil Ministry's headquarters. [5] [6]

  4. List of computer worms - Wikipedia

    en.wikipedia.org/wiki/List_of_computer_worms

    Most known for being the first virus targeting Mac computers. Morris: November 2, 1988 Robert Tappan Morris: Widely considered to be the first computer worm. Although created for academic purposes, the negligence of the author unintentionally caused the worm to act as a denial of service attack.

  5. ILOVEYOU - Wikipedia

    en.wikipedia.org/wiki/ILOVEYOU

    ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". [1]

  6. List of security hacking incidents - Wikipedia

    en.wikipedia.org/wiki/List_of_security_hacking...

    The city of Albany in the U.S. state of New York experiences a ransomware cyber attack. [127] [128] April: Computer systems in the city of Augusta, in the U.S. state of Maine, are seized by hackers using ransomware. [129] [130] The City of Greenville (North Carolina)'s computer systems are seized by hackers using ransomware known as RobbinHood.

  7. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    Exploit (computer security) – Method of attack on computer systems; Industrial espionage – Use of espionage for commercial purposes rather than security; Hardware Trojan – Malware embedded in hardware; harder to detect and fix than software vulnerabilities; Phishing – Form of social engineering