Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
1998
The first virus that actually had the power to damage your computer’s hardware — to fix it, you had to physically replace electronics.
Chen Ing Hau
It was first spotted on July 13th, 2001. The worm infected 360,000 computers in under 14 hours. That’s one of the fastest outbreaks of all time.
Worms are standalone pieces of code that can infect your computer directly. They don’t need to infect any specific program to work.
HELLO! Welcome to http://www.worm.com! Hacked By Chinese!
GET /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0
The idea behind Cryptolocker was simple. It would infect your computer, encrypt all your files, and then give you three days to pay three hundred dollars in an untraceable currency like Bitcoin.
More than $100 million in losses were attributed to the schemes, which infected hundreds of thousands of computers, including a Massachusetts police department that paid a $750 ransom to restore its access to investigative files, digital mugshots and other administrative documents.
A program that gets onto your computer by making you believe it’s something harmless. Or even something that’s supposed to protect you from viruses.
The first known digital weapon deployed in 2009 to slow Iranian nuclear development.The goal was to develop a virus that could take out the centrifuges powering uranium enrichment in the Natanz enrichment plant in Iran.
Stuxnet had to be carried into Natanz on thumb drives, either by double agents or unknowing accomplices. To avoid detection, it came with security certifications stolen from legitimate companies like RealTek and JMicronTechnology, both based in Taiwan.
For 17 months, the virus managed to quietly work its way into the Iranian systems, slowly destroying vital samples and damaging necessary equipment.
Before: 800 centrifuges a year
After: up to 2 thousand centrifuges every couple of months
According to Microsoft, the virus would have taken at least 10,000 hours of coding, and taken a team of five people or more, at least six months of dedicated work.