How to fight computer viruses, spyware and malware
Page: Computer Viruses

Computer Viruses

Computer viruses that come a callin’ –
the list of computer worm and trojan viruses

Every day new computer viruses are created to annoy us and to wreck a havoc on our computer systems. Many of them are simply designed to annoy and cause disruptions on your computer or computer systems.

But some of them can cause a serious and permanent damage and loss of data, often resulting in having to make costly repairs to your computer system, while you try to fight off viruses.

The 10 Most Prevalent Worm and Trojan Viruses

Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.

1. Virus: Trojan.Lodear

A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

2. Virus: W32.Beagle.CO@mm

A mass-mailing worm that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.

3. Virus: Backdoor.Zagaban

A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

4. Virus: W32/Netsky-P

A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

5. Virus: W32/Mytob-GH

A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

6. Virus: W32/Mytob-EX

A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.

7. Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER

This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

8. Virus: Zafi-D

A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".

9. Virus: W32/Netsky-D

A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.

10. Virus: W32/Zafi-B

A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to "We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)"

Minimize your exposure to computer viruses

So, beware of viruses by avoding visits to suspicious websites and not openning email attachments, unless they're from trusted friends. Even then, always keep your antivirus protection on when online or openning email attachments. And above all, keep your antivirus software or internet security subscription always current and get automatic updates.

Computer Virus Articles:


Home
Computer Security
   Computer Protection
   Computer Security Threats
   Computer Security Watch
   Crackdown on Security
   Intrusion Detection Systems
   Securing Your Computer
   Online Security Rules
   Security Suites
Computer Virus
   Computer Virus Prevention
   Computer Virus Protection
   Antivirus Programs Tips
   Computer Viruses
   Fighting Viruses
   Avast Antivirus
   Norton Antivirus
   Trojan Horse
   Zone Alarm
Computer Spyware
   Adware
   Botnets
   Spyware
   CounterSpy
   Spyware Programs
   Intelligent Explorer
   Spyware Remover
Computer Privacy
   Identity Protection
   Fighting Spam
   Encryption
   Keylogger
   Phishing
Computer Software
   Anti Spam Software
   Microsoft Office 2003
   Software-Defined Storage
   Software Products
   Software Testing Service
Internet Security
   Business Internet Security
   Company Sued for Data Breach
   Cyber Security Affects Reputation
   Cyber Security and Small Business
   Cyber Security Culture Change
   Cyber Security for E-Commerce
   Cyber Security Future Trends
   File Sharing Security
   Handle Company Data Breach
   Internet Security Issues
   Third Party Vendor Security
   Wireless Hot Spots
Mobile Security
   Protect iPhone from Viruses
   Stay Secure While Travelling
Web Hosting
   All About Web Hosting
   Choosing Hosting Packages
   Web Hosting Services
   Website Security Myths
Updates
About
Contact
Guest Posts
Links
Link to us

Home
Computer Security
Computer Virus
Computer Spyware
Computer Privacy
Computer Software
Internet Security
Mobile Security
Web Hosting
Updates
About
Contact
Guest Posts
Links
Link to us
Privacy Policy