SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
THE 5 WORSTVIRUSES OF
ALLTIME
Melissa
• One of the earliest virus program that was introduced in the form of
a ‘word document’ and sent as email attachment to people around
the world.
• Its creator, David L. Smith, named it after an exotic dancer from
Florida.
• This virus when opened by the recipient replicates itself and sends
itself to approximately 50 contacts in the address list.
ILOVEYOU
• Just like the Melissa virus, this threat traveled to the computer
systems across the world in the form of an email attachment.
• It was named so because the subject of the email states that the
attachment is a love letter from an admirer.
• Onel De Guzman was believed to be the creator of this virus, but
there is no proper evidence or claim regarding the same.
CODE RED
• Two employees at the eEye Digital found this virus and named it
so as they were drinking Code Red Mountain Dew at that time.
• The main targets of this worm were computer systems that were
installed with Microsoft IIS web server.
• It infects the system by replicating itself hundred times and thus
eats up most of the resources in the system.
Sasser
• Developed by a computer scientist in the year 2004, this
Windows worm works by first slowing down the target system
and then crashing it ultimately.
• It took advantage of buffer overflow vulnerability in Local
Security Authority Subsystem Service (LSASS) and caused
crashes to the systems.
• The effects of this infection were widespread as more than a
million systems were disrupted.
Conficker
• Also known with the name of Downadup, this worm was first
detected in the year 2008.
• Taking advantage of the flaws in the Operating System of
computers, this virus spreads its infection.
• This worm turns the system into a botnet and asks for ransom
money from users
ThankYou

Más contenido relacionado

Destacado

Edisi 8 April Nas
Edisi 8 April NasEdisi 8 April Nas
Edisi 8 April Nasepaper
 
Edisiaceh04
Edisiaceh04Edisiaceh04
Edisiaceh04epaper
 
Edisi 11 Medan
Edisi 11 MedanEdisi 11 Medan
Edisi 11 Medanepaper
 
Edisi 15 Aceh
Edisi 15 AcehEdisi 15 Aceh
Edisi 15 Acehepaper
 
Coches ColeccióN
Coches ColeccióNCoches ColeccióN
Coches ColeccióNenritro
 
Ispim 2005 Entertain
Ispim 2005 EntertainIspim 2005 Entertain
Ispim 2005 EntertainJavier Ruiz
 
4 reasons to consider building your personal brand
4 reasons to consider building your personal brand4 reasons to consider building your personal brand
4 reasons to consider building your personal brandJoanne Spain
 
The Ultimate Player's Coach
The Ultimate Player's CoachThe Ultimate Player's Coach
The Ultimate Player's Coachmfielden
 
Edisi 12 Nov Nas
Edisi 12 Nov NasEdisi 12 Nov Nas
Edisi 12 Nov Nasepaper
 
29mei nas
29mei nas29mei nas
29mei nasepaper
 
04 Mar Aceh
04 Mar Aceh04 Mar Aceh
04 Mar Acehepaper
 
Edisi Medan04
Edisi Medan04Edisi Medan04
Edisi Medan04epaper
 
Ukraine job market overview (Tallinn, June 2014)
Ukraine job market overview (Tallinn, June 2014)Ukraine job market overview (Tallinn, June 2014)
Ukraine job market overview (Tallinn, June 2014)Max Ischenko
 
Dealing With Conflict
Dealing With ConflictDealing With Conflict
Dealing With Conflictguest83b4b30
 
Diagrama de fuerza cortante y momento flector
Diagrama de fuerza cortante y momento flectorDiagrama de fuerza cortante y momento flector
Diagrama de fuerza cortante y momento flectorAntonio Mogollon
 
Vim Cards - Powerpoint Format
Vim Cards - Powerpoint FormatVim Cards - Powerpoint Format
Vim Cards - Powerpoint FormatAdam Lowe
 
Seminario con Humberto Maturana en Bilbao. Notas Junio 2004
Seminario con Humberto Maturana en Bilbao. Notas Junio 2004Seminario con Humberto Maturana en Bilbao. Notas Junio 2004
Seminario con Humberto Maturana en Bilbao. Notas Junio 2004Javier Ruiz
 
Being a Pirate - TEDx Delhi
Being a Pirate - TEDx DelhiBeing a Pirate - TEDx Delhi
Being a Pirate - TEDx DelhiDeepak Ravindran
 

Destacado (20)

Edisi 8 April Nas
Edisi 8 April NasEdisi 8 April Nas
Edisi 8 April Nas
 
Edisiaceh04
Edisiaceh04Edisiaceh04
Edisiaceh04
 
Edisi 11 Medan
Edisi 11 MedanEdisi 11 Medan
Edisi 11 Medan
 
Edisi 15 Aceh
Edisi 15 AcehEdisi 15 Aceh
Edisi 15 Aceh
 
Coches ColeccióN
Coches ColeccióNCoches ColeccióN
Coches ColeccióN
 
Ispim 2005 Entertain
Ispim 2005 EntertainIspim 2005 Entertain
Ispim 2005 Entertain
 
4 reasons to consider building your personal brand
4 reasons to consider building your personal brand4 reasons to consider building your personal brand
4 reasons to consider building your personal brand
 
2010 4.2
2010 4.22010 4.2
2010 4.2
 
The Ultimate Player's Coach
The Ultimate Player's CoachThe Ultimate Player's Coach
The Ultimate Player's Coach
 
Edisi 12 Nov Nas
Edisi 12 Nov NasEdisi 12 Nov Nas
Edisi 12 Nov Nas
 
29mei nas
29mei nas29mei nas
29mei nas
 
04 Mar Aceh
04 Mar Aceh04 Mar Aceh
04 Mar Aceh
 
Edisi Medan04
Edisi Medan04Edisi Medan04
Edisi Medan04
 
Ukraine job market overview (Tallinn, June 2014)
Ukraine job market overview (Tallinn, June 2014)Ukraine job market overview (Tallinn, June 2014)
Ukraine job market overview (Tallinn, June 2014)
 
Dealing With Conflict
Dealing With ConflictDealing With Conflict
Dealing With Conflict
 
Diagrama de fuerza cortante y momento flector
Diagrama de fuerza cortante y momento flectorDiagrama de fuerza cortante y momento flector
Diagrama de fuerza cortante y momento flector
 
Vim Cards - Powerpoint Format
Vim Cards - Powerpoint FormatVim Cards - Powerpoint Format
Vim Cards - Powerpoint Format
 
Seminario con Humberto Maturana en Bilbao. Notas Junio 2004
Seminario con Humberto Maturana en Bilbao. Notas Junio 2004Seminario con Humberto Maturana en Bilbao. Notas Junio 2004
Seminario con Humberto Maturana en Bilbao. Notas Junio 2004
 
Being a Pirate - TEDx Delhi
Being a Pirate - TEDx DelhiBeing a Pirate - TEDx Delhi
Being a Pirate - TEDx Delhi
 
Ethiopia
EthiopiaEthiopia
Ethiopia
 

Similar a The 5 worst viruses of all time

Similar a The 5 worst viruses of all time (20)

COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
The 15 deadliest computer viruses
The 15 deadliest computer virusesThe 15 deadliest computer viruses
The 15 deadliest computer viruses
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Virus09
Virus09Virus09
Virus09
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Virus
VirusVirus
Virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 

Más de kanika sharma

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketingkanika sharma
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingkanika sharma
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?kanika sharma
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attackskanika sharma
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Passwordkanika sharma
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME'skanika sharma
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attackskanika sharma
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should knowkanika sharma
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computerkanika sharma
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?kanika sharma
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security mythskanika sharma
 
6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomwarekanika sharma
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile userskanika sharma
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel itemskanika sharma
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –kanika sharma
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11kanika sharma
 
Device security Tips
Device security TipsDevice security Tips
Device security Tipskanika sharma
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safekanika sharma
 

Más de kanika sharma (20)

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketing
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Password
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME's
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computer
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
 
6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile users
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel items
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11
 
Device security Tips
Device security TipsDevice security Tips
Device security Tips
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
 

Último

The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationKnoldus Inc.
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud DataEric D. Schabell
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FESTBillieHyde
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 

Último (20)

The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its application
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data3 Pitfalls Everyone Should Avoid with Cloud Data
3 Pitfalls Everyone Should Avoid with Cloud Data
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FEST
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 

The 5 worst viruses of all time

  • 1. THE 5 WORSTVIRUSES OF ALLTIME
  • 2. Melissa • One of the earliest virus program that was introduced in the form of a ‘word document’ and sent as email attachment to people around the world. • Its creator, David L. Smith, named it after an exotic dancer from Florida. • This virus when opened by the recipient replicates itself and sends itself to approximately 50 contacts in the address list.
  • 3. ILOVEYOU • Just like the Melissa virus, this threat traveled to the computer systems across the world in the form of an email attachment. • It was named so because the subject of the email states that the attachment is a love letter from an admirer. • Onel De Guzman was believed to be the creator of this virus, but there is no proper evidence or claim regarding the same.
  • 4. CODE RED • Two employees at the eEye Digital found this virus and named it so as they were drinking Code Red Mountain Dew at that time. • The main targets of this worm were computer systems that were installed with Microsoft IIS web server. • It infects the system by replicating itself hundred times and thus eats up most of the resources in the system.
  • 5. Sasser • Developed by a computer scientist in the year 2004, this Windows worm works by first slowing down the target system and then crashing it ultimately. • It took advantage of buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS) and caused crashes to the systems. • The effects of this infection were widespread as more than a million systems were disrupted.
  • 6. Conficker • Also known with the name of Downadup, this worm was first detected in the year 2008. • Taking advantage of the flaws in the Operating System of computers, this virus spreads its infection. • This worm turns the system into a botnet and asks for ransom money from users