-->

Rabu, 26 April 2017

The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.

Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b". Again, depending on how quickly this happens, the old name may persist.

Scope

In terms of scope, there are two major variants: the list of "in-the-wild" viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believed not to be in active circulation (also called "zoo viruses"). The sizes are vastly different, in-the-wild lists contain a hundred viruses but full lists contain tens of thousands.

Comparison of viruses and related programs

Related lists

  • List of computer worms
  • Timeline of computer viruses and worms

Unusual subtypes

  • Palm OS viruses
  • Linux malware

Notable instances

  • Conficker
  • Creeper virus - The first malware that ran on ARPANET
  • ILOVEYOU
  • Leap - Mac OS X Trojan horse
  • Storm Worm - A Windows trojan horse that forms the Storm botnet

Similar software

  • Adware
  • Malware
  • Spamming
  • Spyware
  • Computer worm
  • Trojan horse

Security topics

  • Antivirus software
  • Computer insecurity
  • Cryptovirology
  • Security through obscurity

See also

  • Computer worm
  • Spyware
  • Virus hoax
  • Zombie computer

References

External links

  • The WildList, by WildList Organization International
  • List of Computer Viruses - listing of the Latest Viruses by Symantec.
  • List of all viruses All viruses cataloged in Panda Security’s Collective Intelligence servers.
 
Sponsored Links