Open In App

Interesting Facts about Computer Viruses

Last Updated : 22 Apr, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

A Computer Virus is malicious software or Malware which has capacity to affect computer data, by corrupting or destroying it. When computer virus is executed inside a computer, it replicates itself, modifies other program’s code, and inserts its own code. Viruses have potential to produce unexpected damage to system, like corrupting or destroying software data.

 Signs of Computer Viruses :

  1. Increase in frequency of pop-up windows.
  2. Sending mass emails from your email account.
  3. Frequent crashes and hanging of system.
  4. Unusual degradation in computer performance.
  5. Unusual activities like password changes.
  6. Running of unwanted or unknown programs that startup when you turn on your computer.

Type of Computer Viruses :

  • Boot sector virus
  • Web scripting virus
  • Browser hijacker
  • Resident virus
  • Direct action virus
  • File infector virus
  • Multipartite virus
  • Polymorphic virus
  • Macro virus

Here are some facts about Computer Viruses that may amaze you :

  • The first polymorphic computer virus was Tequila (1991).
  • In March 2005, first smartphone virus named “Commwarrior-A” came to existence.
  • Viruses can be written in many programming languages like Assembly language, C language, etc.
  • Facebook will pay 500$ to person, who will find a vulnerability in its system.
  • In 1990, Symantec launched its first Norton Antivirus.
  • Before development of computer networks, many viruses were transferred using floppy disks.
  • WinVer 1.4 was first Windows virus, Groove was first .exe file and Farooq Alvi brothers created first boot virus.
  • Studies show author of malicious software is typically a male, between 14 and 25 years of age.
  • In January 2004, Mydoom virus infected almost a quarter-million computers in a day.
  • In January 2007, a worm named “Storm” infected around 50 million computers by October.
  • People are unaware that 90% of e-mails contain some type of Malware.
  • More than 6000 new computer viruses are created and released every month.
  • The most expensive computer virus of all time was MyDoom, it caused 38.5 billion$ of damages.
  • In 1990, there were only 50 known computer viruses but now there are more than 48, 000 viruses.
  • It is observed that virus writers start by writing codes as children to test programming skills until it reaches dangerous level.
  • The most viral computer virus ever is “I love”.
  • In spite of having a large number of security programs and security methods, there is not a single anti-virus that can detect and clean all types of viruses.
  • In many countries like Germany, Finland it is illegal to write a computer virus program.
  • On records, US is at highest risk of being attacked by computer viruses followed by Russia.
  • Amazon has faced most phishing attacks followed by Apple and eBay.
  • Michelangelo was worst ever MS-DOS virus.
  • In 1999, a powerful micro virus is known as “Melissa” forced Microsoft and other big against to shut down their mail system.
  • Email malware gets activated only when you click on a malicious link or infected attachment, not by reading emails.


Similar Reads

Types of Viruses
A virus is a fragment of code embedded in a legitimate program. Viruses are self-replicating and are designed to infect other programs. They can wreak havoc in a system by modifying or destroying files causing system crashes and program malfunctions. On reaching the target machine a virus dropper(usually a trojan horse) inserts the virus into the s
4 min read
Some Known Viruses & Worms
A program positioned into another program is called a virus though it is due to the host program any program gets activated, and it copies itself and opens it out to others through floppy transfer. Every time the user will run the malicious application a virus will infect the information Or program Or data and the virus take advantage & copy it
6 min read
What are Polymorphic Viruses?
A computer virus is a program or malicious code that spreads between computers and performs destructive activities on the system. It spreads by attaching a copy of itself to a program file. The viruses simply replicate, display messages, and others might deliver a portion of the malicious code to a program that has the ability to corrupt programs,
3 min read
How To Scan Zip Files For Viruses And Zip Bombs?
A Zip File is a binary file format that creates a single file for multiple files for easy access as well as facilitates to sharing of large as well as multiple files over the internet. It provides user convenience in that it enables people to transfer, store, and share relatively small files. However, this convenience comes with a risk: Just like r
7 min read
Difference between Micro Computer and Mini Computer
1. Micro Computer :Micro Computer, as the name suggests, is a personal computer that is specially designed for personal use and generally consists of a single chip that is CPU, data memory, I/O buses, etc. It can be used by one person at a time. Its type includes tablet and smartphone microcomputers, desktop microcomputers, workstations, and server
6 min read
How to Find Network IP Address of Computer Using Computer Name?
Answer: By using the command "ping" followed by the computer name in the command prompt or terminal.To find the network IP address of a computer using its computer name: Open Command Prompt or Terminal Begin by opening the Command Prompt (Windows) or Terminal (macOS/Linux) on your computer. Use the Ping Command Type "ping" followed by the computer
1 min read
How To Connect One Computer To Another Computer via LAN?
Answer: To connect one computer to another computer via LAN, use an Ethernet cable to directly connect their Ethernet ports.The most common methods include: Wired Ethernet Connection: Use an Ethernet cable to directly connect the two computers' network ports. For more than two computers, connect each computer to a network switch or router with Ethe
1 min read
25 Facts about LTE Technology
With the advent of 4G mobile phones, LTE technology has also become very popular. It is used to connect to Internet and also provides voice calling facilities. Let us have look at 25 interesting Fats about LTE Technology. It stands for Long Term Evolution (LTE).It was started as project in 2004.It was developed by 3GPP or Third generation partnersh
3 min read
Computer Networks - GATE CSE Previous Year Questions
Solving GATE Previous Year's Questions (PYQs) not only clears the concepts but also helps to gain flexibility, speed, accuracy, and understanding of the level of questions generally asked in the GATE exam, and that eventually helps you to gain good marks in the examination. Previous Year Questions help a candidate practice and revise for GATE, whic
4 min read
Computer Networks | Set 5
Following questions have been asked in GATE CS 2005 exam. 1) Packets of the same session may be routed through different paths in: (a) TCP, but not UDP (b) TCP and UDP (c) UDP, but not TCP (d) Neither TCP nor UDP Answer (b) Packet is the Network layer Protocol Data Unit (PDU). TCP and UDP are Transport layer protocols. Packets of same session may b
2 min read