Top 10 Computer Viruses

Feb 23, 2011

We take a (not-so) affectionate look back at the world's most memorable computer viruses, from Creeper to Conficker.

Copyright © PC & Tech Authority. All rights reserved.

  <b>Klez:</b>
<br><br>
The late 90s-early 2000s were not only the golden age of the internet, they also seemed to be the golden age for malware. Over that time period, few viruses were able to match the reign of Klez.

Like many other viruses of its time, Klez spread through email. Users were duped into opening infected files and, once the malware was installed, the victim's address book was opened and copies of the attack were sent to contacts. 
<br><br>
Klez, however, took this a step further. Not only did the virus send itself to people in your address book, it also pretended to be from other people. Later, the worm wreaked further havoc by pretending to be its own removal tool. 

Klez is a cunning little devil, and variants are still doing the rounds today.
 
 

Klez:

The late 90s-early 2000s were not only the golden age of the internet, they also seemed to be the golden age for malware. Over that time period, few viruses were able to match the reign of Klez. Like many other viruses of its time, Klez spread through email. Users were duped into opening infected files and, once the malware was installed, the victim's address book was opened and copies of the attack were sent to contacts.

Klez, however, took this a step further. Not only did the virus send itself to people in your address book, it also pretended to be from other people. Later, the worm wreaked further havoc by pretending to be its own removal tool. Klez is a cunning little devil, and variants are still doing the rounds today.

Image 5 of 11
 
comments powered by Disqus

Latest Photo Galleries

Latest News

ALRC drops safe harbour from proposed privacy law
Sep 3, 2014
Online intermediaries encouraged to act against breaches.
Compuware sold to private equity firm
Sep 3, 2014
Application performance firm to become a privately-held company.
US Home Depot investigating possible data breach
Sep 3, 2014
Banks reportedly trace stolen cards to retailer.
Govt dumps controversial Labor offshore cloud policy
Sep 3, 2014
Complaints lead to removal of double ministerial sign-off.
Researcher derides Brandis' focus on insider threats
Sep 3, 2014
Warns against creating an 'oppressive workplace'.