The Early Big Cases Of Computer Viruses

By Jason A Smail | Technology

Mar 06

Many people refer the viruses as malicious programs, which is currently commonly called malware. Computer viruses are actually just one type of malware, self-replicating programs are designed to spread themselves from computer to computer. Meanwhile, perhaps you need to use the Best free antivirus for pc if you wish to have a good defense for your computer without wasting your money.

Security software development company, ESET revealed the virus is the earliest malware found. Here’s a history of some of the most famous viruses and malware that spread threats and riots in the world:

PAKISTANI BRAIN (1986)

The first virus for the IBM PC platform and the first used a stealth mechanism. Pakistani Brain infects the floppy disk boot sector, spreading globally in a matter of weeks. Since the Brain virus first attacked in 1986, worms and Trojans continue to attack and infect PCs. However, of all threats faced by users, each year can be defined by one significant virus. Denzuko, a malware made in Indonesia, is a program that can kill c-brain, but it itself spreads like a virus (nematode).

STONED (1987)

This boot sector virus initially spread throughout New Zealand and Australia. Infected computers will display pro-drug slogans at the start, including “Your PC now is Stoned” and “Legalize Marijuana.” The Stoned virus has many variants and is very common in the early 1990s

MORRIS WORM (1988)

Developed by Robert Tappan Morris Jr. Son of former NCSC scientist. Often referred to as the first worm, viruses spread in thousands or maybe tens of thousands of computers and workstations running VMS, BSD, and SunOS.

AIDS trojan (1989)

First Ransomware. Request 189 US dollars to be sent to PO BOX in Panama

WHALE (1990)

Regarded as a pioneer in anti-debugging technology, Whale is considered a virus, but it is very large and very inefficient. A researcher at the time described the main method of Whales replication as an antiviral researcher who sent specimens to each other. Unfortunately, malware makers have learned a lot since then.

About the Author