The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.
Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b". Again, depending on how quickly this happens, the old name may persist.
In terms of scope, there are two major variants: the list of "in-the-wild" viruses, which list viruses in active circulation, and lists of all known viruses, which also contain viruses believed not to be in active circulation (also called "zoo viruses"). The sizes are vastly different: in-the-wild lists contain a hundred viruses but full lists contain tens of thousands.
{|class="wikitable sortable" border="1"
!Virus
!Alias(es)
!Types
!Subtype
!Isolation Date
!Isolation
!Origin
!Author
!Notes
|-
|1260
|V2Px
|DOS
|Polymorphic
|1990
|
|
|
|First virus family to use polymorphic encryption
|-
|4K
|4096
|DOS
|
|1990-01
|
|
|
|The first known MS-DOS-file-infector to use stealth
|-
|5lo
|
|DOS
|
|1992-10
|
|
|
|Infects .EXE files only
|-
|Abraxas
|Abraxas5
|DOS,Windows 95, 98
|
|1993-04
|Europe
|
|ARCV group
|Infects . Disk directory listing will be set to the system date and time when infection occurred.
|-
|Acid
|Acid.670, Acid.670a, Avatar.Acid.
Cette page est générée automatiquement et peut contenir des informations qui ne sont pas correctes, complètes, à jour ou pertinentes par rapport à votre recherche. Il en va de même pour toutes les autres pages de ce site. Veillez à vérifier les informations auprès des sources officielles de l'EPFL.
vignette|Fonctionnement de conficker (Downup) Conficker (connu aussi sous les noms de Downup, Downadup et Kido) est un ver informatique qui est apparu fin novembre 2008. Ce ver exploite une faille du Windows Server Service utilisé par Windows 2000, Windows XP, Windows Vista, Windows 7, Windows Server 2003 et Windows Server 2008. Conficker est principalement installé sur les machines fonctionnant sous Windows XP. Microsoft a publié un patch pour réparer la faille exploitée par ce ver le 28 octobre 2008.
300px|right|thumb|Le cycle de vie d'un spam originaire d'un botnet :(1) Site web du spammeur (2) Spammeur (3) Logiciel de spam (4) Ordinateurs zombies (5) Virus ou cheval de troie (6) Serveurs de courrier (7) Utilisateurs (8)Trafic internet. Le botnet Storm (à ne pas confondre avec StormBot, qui est un script TCL non malveillant) est un réseau commandé à distance de machines zombies (ou "botnet") qui ont été infectées par le ver Storm, un cheval de Troie répandu par e-mail.
This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. John von Neumann's article on the "Theory of self-reproducing automata" is published in 1966. The article is based on lectures given by von Neumann at the University of Illinois about the "Theory and Organization of Complicated Automata" in 1949. The first story written about a computer virus is The Scarred Man by Gregory Benford.
Explore différents types de logiciels malveillants, des défenses contre eux, et des exemples du monde réel comme le ver Stuxnet ciblant les centrales nucléaires iraniennes.
Explore les violations de données dans les organismes sans but lucratif, les plans d'intervention en cas d'incident, les exigences juridiques, les stratégies de cybersécurité et les défis auxquels sont confrontées les organisations.
Acute infectious gastroenteritis is an important illness worldwide, especially on children, with viruses accounting for approximately 70% of the acute cases. A high number of these cases have an unknown etiological agent and the rise of next generation seq ...
Enteroviruses are a leading cause in a diversity of severe human diseases worldwide and the presence of these viruses in recreational water can present a risk for human health. Viruses' capacity to persist in the outside environment is limited but some vir ...
2019
, , ,
Waterborne viruses are responsible for numerous diseases and are abundant in aquatic systems. Understanding the fate of viruses in natural systems has important implications for human health. This research quantifies the uptake of bacteriophage T4 and the ...