Worst Computer Viruses Part 4

Jul 17, 2017 | IT Services

Part four of some of the worst computer viruses ever created.

Daprosy Worm

A malicious computer program that spreads via Local Area Network (LAN) connections, spammed emails and USB mass storage device.


A Trojan that exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP.


A Trojan found in a digital photo frame and the first serious computer virus on a digital photo frame that collected passwords for online games. The virus is able to recognize and block antivirus protection from more than a hundred security companies and the Windows built-in firewall.


A Trojan that affects Windows, turning off anti-virus applications and allows others to access the computer, modifies data, steals confidential information and installs more malware on the victim’s computer.


A network worm that attacks Microsoft Windows, Mac OSX and Linux platforms that originally targeted users of networking websites like Facebook, Twitter, Skype, Yahoo Messenger and email websites such as Gmail and Yahoo Mail in an attempt to gather victim’s login information.

Waledac botnet

A botnet mostly in email spam and malware.


A malicious computer worm that targets industrial computer systems and was responsible for causing substantial damage to Iran’s nuclear program. The software was designed to erase itself in 2012 which eliminated the scope of its effects.


A virus that spreads across peer-to-peer networks and is programmed to monitor the browsing history of victims.

Anti-Spyware 2011

A Trojan horse that poses as an anti-spyware program that actually disables security-related process of anti-virus programs, while also blocking access to the Internet, effectively preventing updates.


A collection of computer malware that provides services to the attackers.

Browse Posts

By Archives

Want to Learn More?

Whether it’s physical or digital, we can provide a protected location to store all of your information including storage on our servers for off-site backups and provide you with secure access.


  • This field is for validation purposes and should be left unchanged.

Pin It on Pinterest

Share This