SlideShare a Scribd company logo
1 of 12
History of Computer Virus
Introduction to Computer Virus
Definition:
A virus a type of self-replicating malware program
that spreads from one computer to another.
Malware:
It is a blanket term used to describe all
harmful files, including virus.
The Interesting History of Virus
1981 - “Elk Cloner” strikes Apple DOS. It showed a
poem on the computer screen.
1986 - Two Pakistani brothers wrote a code called
“Brain” to protect their medical software. It
replaced a floppy's boot sector and disk label
with it's name in IBM PCs (MS DOS).
1990 – Ralf Burger develops “Chameleon,” the first
ever polymorphic virus. Same year, Symantec
launches Norton Antivirus, the first
commercially available AV.
The Interesting History of Virus
1999 – Happy99 attaches to emails with a Happy
New Year message; affects Windows 95 and
Windows 98.
2000 – ILOVEYOU virus hits computers and deletes
JPEGs, MP2, and MP3 files.
2001 – Anna Kournikova virus spreads through
Microsoft Outlook and sends malicious files to
people in compromised address book.
The Interesting History of Virus
2006 – OSX/Leap-A becomes the first known
malware discovered in Mac OS X.
2007 – Zeus Trojan steals login credentials from
banking websites and commits financial
fraud.
2008 – Koobface targets Facebook and MySpace
users.
2013 – Cryptolocker ransomware encrypts files and
demands a ransom to unlock files.
Types of Virus

Trojan disguises itself as a normal file to trick
users into downloading it.

Potentially Unwanted Programs (PUPs) installs
itself on target computers without a user's
consent.

Adware bombards computers with unsolicited ads
when victims browse the internet.

Spyware hides in a user's browser and collects
important data stealthily.
Cost of Damage

ILOVEYOU (2001) virus inflicted a global loss of
$15 billion.

Sobig virus (2003) wreaked havoc over $37
billion.

Mydoom (2004) virus caused a loss of $38
billion.
Scale of Damage

32% of computers worldwide are infected with
some kind of virus.

As of 2014, over 30% of households in the
US were infected by malware.

China ranks first in the list of top ten
countries that have the worst case of virus
infection.
Virus Prevention & Safety Measures

Make a habit of browsing secure https:// websites

Install and keep antivirus & firewall (or an
internet security suite that has both) turned on

Keep all software up-to-date

Back up your data
Virus Prevention & Safety Measures

Don't open attachments or click on links coming through
suspicious emails

Use public wi-fi networks with caution

Be wary of file-sharing websites

Perform monetary transactions only through trusted
payment gateways
How to Remove Virus?
1. Restart PC in Safe Mode
2. Delete Temporary Files
3. Download Comodo Free Antivirus and run a scan
4. Delete and uninstall unauthorised programs
5. Fix browser settings and connections
Useful Resources
Malware Search Engine – https://file-intelligence.comodo.com/
What is Antivirus Software -
https://antivirus.comodo.com/what-is-antivirus-software.php
How Antivirus Works? -
https://antivirus.comodo.com/how-antivirus-software-works.php

More Related Content

Viewers also liked

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonLori deRoin
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Chapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIESChapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIESRhea Dulla
 
Computer capabilities limitations
Computer capabilities limitationsComputer capabilities limitations
Computer capabilities limitationsJesus Obenita Jr.
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...www.sciencepowerpoint.com
 
Computer Capabilities
Computer CapabilitiesComputer Capabilities
Computer CapabilitiesVangieReyes
 
Computer Applications Powerpoint Presentation
Computer Applications Powerpoint PresentationComputer Applications Powerpoint Presentation
Computer Applications Powerpoint Presentationguest0d3ba1
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 

Viewers also liked (19)

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Chapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIESChapter 11: THE COMPUTERS CAPABILITIES
Chapter 11: THE COMPUTERS CAPABILITIES
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer capabilities limitations
Computer capabilities limitationsComputer capabilities limitations
Computer capabilities limitations
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Capabilities
Computer CapabilitiesComputer Capabilities
Computer Capabilities
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Capabilities and limitations of computer
Capabilities and limitations of computerCapabilities and limitations of computer
Capabilities and limitations of computer
 
Computer Applications Powerpoint Presentation
Computer Applications Powerpoint PresentationComputer Applications Powerpoint Presentation
Computer Applications Powerpoint Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Antivirus
AntivirusAntivirus
Antivirus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Guide for learn Computer Virus History

  • 2. Introduction to Computer Virus Definition: A virus a type of self-replicating malware program that spreads from one computer to another. Malware: It is a blanket term used to describe all harmful files, including virus.
  • 3. The Interesting History of Virus 1981 - “Elk Cloner” strikes Apple DOS. It showed a poem on the computer screen. 1986 - Two Pakistani brothers wrote a code called “Brain” to protect their medical software. It replaced a floppy's boot sector and disk label with it's name in IBM PCs (MS DOS). 1990 – Ralf Burger develops “Chameleon,” the first ever polymorphic virus. Same year, Symantec launches Norton Antivirus, the first commercially available AV.
  • 4. The Interesting History of Virus 1999 – Happy99 attaches to emails with a Happy New Year message; affects Windows 95 and Windows 98. 2000 – ILOVEYOU virus hits computers and deletes JPEGs, MP2, and MP3 files. 2001 – Anna Kournikova virus spreads through Microsoft Outlook and sends malicious files to people in compromised address book.
  • 5. The Interesting History of Virus 2006 – OSX/Leap-A becomes the first known malware discovered in Mac OS X. 2007 – Zeus Trojan steals login credentials from banking websites and commits financial fraud. 2008 – Koobface targets Facebook and MySpace users. 2013 – Cryptolocker ransomware encrypts files and demands a ransom to unlock files.
  • 6. Types of Virus  Trojan disguises itself as a normal file to trick users into downloading it.  Potentially Unwanted Programs (PUPs) installs itself on target computers without a user's consent.  Adware bombards computers with unsolicited ads when victims browse the internet.  Spyware hides in a user's browser and collects important data stealthily.
  • 7. Cost of Damage  ILOVEYOU (2001) virus inflicted a global loss of $15 billion.  Sobig virus (2003) wreaked havoc over $37 billion.  Mydoom (2004) virus caused a loss of $38 billion.
  • 8. Scale of Damage  32% of computers worldwide are infected with some kind of virus.  As of 2014, over 30% of households in the US were infected by malware.  China ranks first in the list of top ten countries that have the worst case of virus infection.
  • 9. Virus Prevention & Safety Measures  Make a habit of browsing secure https:// websites  Install and keep antivirus & firewall (or an internet security suite that has both) turned on  Keep all software up-to-date  Back up your data
  • 10. Virus Prevention & Safety Measures  Don't open attachments or click on links coming through suspicious emails  Use public wi-fi networks with caution  Be wary of file-sharing websites  Perform monetary transactions only through trusted payment gateways
  • 11. How to Remove Virus? 1. Restart PC in Safe Mode 2. Delete Temporary Files 3. Download Comodo Free Antivirus and run a scan 4. Delete and uninstall unauthorised programs 5. Fix browser settings and connections
  • 12. Useful Resources Malware Search Engine – https://file-intelligence.comodo.com/ What is Antivirus Software - https://antivirus.comodo.com/what-is-antivirus-software.php How Antivirus Works? - https://antivirus.comodo.com/how-antivirus-software-works.php