Connect with us

Latest Computer Viruses


Viruses are more than a nuisance these days. Whether they are biological viruses like SARS and dengue, or computer viruses like Win32, Viking, Gen,  Trojan, Renos, and PGZ, they always not only annoy the receiver but also make them vulnerable for further attacks from other viruses and malware. With the advent of the information age where many technologies have improved and helped facilitate our world to become a global village, they have also brought numerous disadvantages in the disguise of blessings.

A virus is something which is disguised as some very useful and helpful application but once the user installs the so-called useful application, it turns out to be a nightmare.  According to the classification of internet encyclopedias, there are more than 5000 types of major viruses and malware and with each passing day, dozens of new viruses are being created and spread all over the internet. The US Department of Homeland Security has also issued a renewed warning that many new kinds of cyber attacks in near future may cause a more than $2 billion USD loss to US economy.  Considering the seriousness of issue, all internet users must update themselves regarding recent viruses and their methods of befooling others. This article lists the five most dangerous recent viruses, in descending order, which are not only lethal but also difficult to avoid without proper knowledge.

Win32.Worm.Stuxnet.A

If you have detected a sudden decrease in your internet speed and connectivity then one of the reasons could be this malicious virus.  It works by massively propagating network use and resources by targeting data acquisition and supervisory control systems (SCADA), thus making your system vulnerable to backdoor intrusions.

Worm.P2P.Palevo.FP

This virus is a nuisance that very much irritates those who use instant message applications.. All of sudden a message is sent through your instant messenger in a form of emoticon along with a link. If clicked, the link takes the user to contact page of a popular social networking site and after a few moments, it hides itself by modifying its property to ‘hidden’.  It not only stops your windows automatic updates but also attempts to disable Microsoft antimalware protection in Windows.

Worm.P2P.Palevo.AT

This is the one of the trickiest which fakes itself by creating a false Recycle Bin icon, a fake MS word processing description in Task Manager, and a phony GIF picture icon, all at once. This virus can be spread through removable media, instant messengers and P2P networking. If you click on the fake Recycle Bin icon, it would lead you to a real replica of a Recycle Bin but every click would be making further files and registry modifications until your PC starts running out of RAM.

Trojan.PWS.Onlinegames.KDCI

If you are looking for an illegal password for playing online games like Dekaron, Knight, Lord of the Rings and others than you could potentially fall victim of this malicious virus. Upon its execution, it creates several hidden files which are responsible for creating many copies of the source file, thereafter removing all the traces of the original. . By creating a fake “get password” icon, it pretends to be a password cracker; however in the back end it injects hooks in the explorer while making the theft of your own passwords easier for hackers.

Java.Trojan.Downloader.OpenConnection.AI

A highly rated virus with increased network activity is on the top of our list. This virus disguises itself as a java applet file and upon its execution, lets hackers intrude in your system by secretly uploading further malicious software into your PC.  In the Task Manager, it lists itself as java.exe and thus is not easily detectable for many antivirus solutions.

Recommendation:

Always make sure that your system is loaded with any one of the top 10 antivirus solutions. Furthermore, your antivirus must be up to date and set for automatic updates so your virus definition files are always equipped with the latest tools to protect your system and prevent identity theft.

Connect