19.05.15 | 0 Comments|
Computer viruses are known to anyone who has a computer these days. Back in the 80s, when computers just started becoming popular in homes and businesses due to the IBM PC in ’82 and the Apple Macintosh in ’84, computer viruses first started to become more widespread. Computer viruses worked very similarly to biological viruses in that their purpose was to infect as many programs and computers as possible. Most had an “end-game” which would be triggered by a date, the number of computers they infected, or an action taken on the computer by the user. The “end-game” would usually involve the virus erasing all of the user’s data.
Long before the first virus was ever created, in 1949, John Von Neumann, a mathematician, talked about the concept of programs which could self-replicate and in the 1960s a game called Core Wars was developed by a group of programmers. Core Wars would reproduce itself every time it was played and flood the other player’s computer memory. After that, Reeper was created, which destroyed Core War copies, making it the first antivirus program.
The Brain Virus was malicious code developed by two Pakistani brothers. It spread via floppy disks and infected the boot sectors of disks, remaining undetected while occupying unused space thus making all of the information on the disk inaccessible. An antivirus to detect and remove this virus was developed two years later, in 1988.
Discovered in the Lehigh University in the US, this virus was a file infector that attacked executable files and took control when the user opened the files. Around this time, the Jerusalem Virus also appeared, another famous file infector.
Originating in Germany, this was the first encrypted virus, adding code that couldn’t be removed.
This was an email virus which spread by forwarding itself to 50 people in the user’s address book.
Created in the Philippines, the ILOVEYOU virus did a lot of damage worldwide by deleting files and emailing the creator users’ personal account logins. The total damage amounted to 5.5 billion USD.
Causing 2 billion USD in damage, these two worms infected over 700,000 computers and were very harmful. The worms worked by replicating themselves and replacing web pages in servers with a page that had the message “Hacked by Chinese”. This particular threat even launched an attack on the White House website, forcing them to change their IP address to circumvent the attacks.
This virus tricked users into loading it on their PCs and infected millions of computers around the world. These days, antivirus programs know how to detect and block it.
Viruses continue to pop up every day, ranging from worms and trojans, to phishing attacks and email viruses. Users need to take precautions to avoid damage to their computers and files and to be safe from identity theft and credit card fraud. To summarize it all for you, here is what you should do: always keep your operating system and browsers updated, and/or a security suite, read reviews about antivirus software and install a strong and effective Anti-virus software giving your devices the best protection.
Our goal is to provide answers to all of your questions so you can make a confident purchasing decision. We welcome your feedback, so please email us at firstname.lastname@example.org with suggestions and questions. We’d love to hear from you!