{"id":59879,"date":"2022-11-14T20:49:32","date_gmt":"2022-11-14T12:49:32","guid":{"rendered":"https:\/\/version-2.com\/?p=59879"},"modified":"2023-02-22T14:31:43","modified_gmt":"2023-02-22T06:31:43","slug":"the-most-dangerous-computer-viruses-in-history","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/11\/the-most-dangerous-computer-viruses-in-history\/","title":{"rendered":"The most dangerous computer viruses in history"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"59879\" class=\"elementor elementor-59879\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/11\/659-2-1-980x540.png\" width=\"980\" height=\"540\" \/><\/p><p>Here, in our beloved Pandora FMS blog, we have talked a big deal about <a href=\"https:\/\/pandorafms.com\/blog\/computer-security-tips\/\" target=\"_blank\" rel=\"noreferrer noopener\">computer risks.<\/a> This does not mean of course that we consider ourselves to be faint-hearted or timid, but rather cautious heroes. And in order not to be alone in a battle against the evil that lurks around, today, continuing with this theme of terror and digital desolation, we bring you: <strong>some of the most dangerous computer viruses in human history!<\/strong><\/p><div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div><h2><strong><strong>These are the computer viruses you should fear the most!<\/strong><\/strong><\/h2><div class=\"wp-block-spacer\" style=\"height: 31px;\" aria-hidden=\"true\">\u00a0<\/div><h3><strong><strong>What is a computer virus?<\/strong><\/strong><\/h3><div class=\"wp-block-spacer\" style=\"height: 31px;\" aria-hidden=\"true\">\u00a0<\/div><p>Before bringing on the storm, listing malicious software, we\u2019d better explain a little <strong>what this whole thing about computer viruses is<\/strong> and why, although you have to be careful with them, you don\u2019t need to use masks.<\/p><p><strong>A computer virus is a malicious program or code created and conceived to truncate the operation of a computer.\u00a0<\/strong><\/p><p>Like the biological microorganism, they are also infectious, although these replicate only within computer equipment.<\/p><p>They propagate from one computer to another, usually attached to a legitimate document, then execute their cursed code.<\/p><p>Although you may think the computer virus has been with us since the first pulley system, it was <strong>Leonard M. Adleman<\/strong>, in <strong>1984<\/strong>, the first to use the term while finding similarities between his student Fred Cohen\u2019s college experiment and the HIV virus.<\/p><div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div><h3><strong><strong>List of the most dangerous computer viruses that have ever existed<\/strong><\/strong><\/h3><div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div><p>Now, let\u2019s get down to business!<\/p><p>We go into it!<\/p><div class=\"wp-block-spacer\" style=\"height: 32px;\" aria-hidden=\"true\">\u00a0<\/div><h4><strong>I LOVE YOU<\/strong><\/h4><div class=\"wp-block-spacer\" style=\"height: 29px;\" aria-hidden=\"true\">\u00a0<\/div><p>Funny thing is, this virus does everything but love and appreciate you for who you are. In fact, on its own, it has devoted itself to creating chaos around the world with about <strong>10 million dollars<\/strong> <strong>in damages<\/strong>.<\/p><p>It came to be believed that <strong>10% of all computers in the world<\/strong> were infected by it and it caused large institutions and governments to disable their email system for not wanting to take any risks.<\/p><p>You see, something not even the tiresome, stalking Linkedin publicity achieved.<\/p><p>I love you was created in the Philippines by <strong>Reonel Ramones <\/strong>and<strong> Onel de Guzman<\/strong> using<a href=\"https:\/\/pandorafms.com\/blog\/information-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"> social engineering<\/a> (<em>\u201cA set of techniques that cybercriminals use to trick incautious users into sending them confidential data, infecting their computers with malware, or opening links to infected sites\u201d) <\/em>they sneaked it into the Philippines, to all of Asia, and in a short time to the rest of the world.<br \/><strong>Fun fact:<\/strong><\/p><p>As the email they sent for you to click on the attachment was a declaration of love, the virus was called \u201cI Love You\u201d.<\/p><div class=\"wp-block-spacer\" style=\"height: 29px;\" aria-hidden=\"true\">\u00a0<\/div><h4><strong>MELISSA<\/strong><\/h4><div class=\"wp-block-spacer\" style=\"height: 29px;\" aria-hidden=\"true\">\u00a0<\/div><p>Its creator was <strong>David L. Smith<\/strong> and detonated in \u201999 as an infected Word document that was presented to the world as the best thing ever for perverts:<\/p><p><em>\u201cHello, I am a list of passwords for pornographic websites.\u201d<\/em><\/p><p>At that time the virus was mailed to the fifty most important people in your email and created havoc with his deceptive list of passwords. Of course, the most curious and salacious ones fell for it right away.<\/p><p>It also came with a sort of cover letter, a reference to the Simpsons.<\/p><p>Less than a week after his presentation to the public, David L. Smith was captured by the police. Oh, I\u2019m sorry, David.<\/p><p>However, for his special collaboration with the authorities in trapping other perfidious virus creators, his sentence was reduced from 10 years to 20 months.<\/p><p>Still\u2026 His virus caused <strong>80 million dollars in damage<\/strong>.<\/p><p><strong>Fun fact:<\/strong><\/p><p>If \u201cMelissa\u201d sounds like a sinuous and more like the name of a hurricane, it has to do with the fact that it comes from an exotic dancer from Florida.<\/p><div class=\"wp-block-spacer\" style=\"height: 29px;\" aria-hidden=\"true\">\u00a0<\/div><h4><strong>ZEUS<\/strong><\/h4><div class=\"wp-block-spacer\" style=\"height: 31px;\" aria-hidden=\"true\">\u00a0<\/div><p>A <strong>trojan<\/strong> (<em>\u201cA malware that presents itself to the user as a seemingly legitimate and harmless program, but which, when executed, gives an attacker remote access to the infected computer\u201d<\/em>) created especially to truncate computers with <strong>Windows<\/strong>.<\/p><p>It did a number of awkward things on your computer, including capturing forms.<br \/>Most computers became infected due to hidden downloads or phishing (<em>\u201cA technique that involves sending an email from a cybercriminal to a user pretending to be a legitimate entity\u201d<\/em>).<\/p><p>It was used for such ominous things as stealing login credentials from social networks, emails, and bank accounts.<\/p><p>In the United States alone, <strong>more than one million computers<\/strong> were infected.<\/p><p><strong>Fun fact:<\/strong><\/p><p>It compromised corporations such as Amazon, Oracle, Bank of America, Cisco, and many more.<\/p><div class=\"wp-block-spacer\" style=\"height: 32px;\" aria-hidden=\"true\">\u00a0<\/div><h4><strong>STUXNET\u00a0<\/strong><\/h4><div class=\"wp-block-spacer\" style=\"height: 31px;\" aria-hidden=\"true\">\u00a0<\/div><p>The virus is believed to have been created by the<strong> Israel Defense Forces<\/strong> along with the <strong>United States Government<\/strong>.<\/p><p>With these two agents involved, what do you think? That the virus was spawned as an experimental project and that it got out of hand? Or that it was done, expressly, to bring chaos upon our civilization?<\/p><p><strong>Bingo!<\/strong><\/p><p>This virus was designed for cyber warfare.<\/p><p>It had the goal of halting Iran\u2019s advances in nuclear defense. And so it was, much of the infection took place in Iran.<\/p><p><strong>Fun fact:<\/strong><\/p><p>It spread through infected pen drives and altered the speed of the devices until they became damaged.<\/p><div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div><h4><strong>CRYPTOLOCKER\u00a0<\/strong><\/h4><div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div><p>A ransomware (<em>\u201cA type of malicious program that restricts access to certain parts or files of the infected operating system and asks for a ransom in exchange for removing this restriction\u201d<\/em>) Trojan that uses, among other means, email to spread.<\/p><p>Once your computer was infected it went on to encrypt some files from the hard drive.<\/p><p>The thing here is that, even though it\u2019s easy to remove as a virus, the files it encrypted stayed still encrypted, unless you paid a ransom by a deadline.<\/p><p>The ransom used to be <strong>$ 400,<\/strong> although it could increase, and the number of infected computers was <strong>500,000<\/strong>.<\/p><p>Make the numbers yourself\u2026 With only half paying the scammers, you could afford a house in Florida!<\/p><p>Thank God, <strong>Evgeny Bogachev<\/strong>, leader of the organization that operated with this virus was arrested and forced to return all encrypted keys.<\/p><p><strong>Fun fact:<\/strong><\/p><p>In the end, only <strong>1.3%<\/strong> of those infected fell into the scam\u2026 That\u2019s about <strong>3 million dollars<\/strong>. Not bad at all!<\/p><div class=\"saboxplugin-wrap\"><div class=\"saboxplugin-tab\"><div class=\"saboxplugin-gravatar\"><img decoding=\"async\" class=\"lazyloaded\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2020\/10\/pandorafms-cockpit-e1601301802322.jpg\" alt=\"\" width=\"100\" height=\"100\" data-src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2020\/10\/pandorafms-cockpit-e1601301802322.jpg\" \/><noscript><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2020\/10\/pandorafms-cockpit-e1601301802322.jpg\" width=\"100\" height=\"100\" alt=\"\" itemprop=\"image\" data-eio=\"l\"><\/noscript><\/div><div class=\"saboxplugin-authorname\"><a class=\"vcard author\" href=\"https:\/\/pandorafms.com\/blog\/author\/dimas\/\" rel=\"author\"><span class=\"fn\">Dimas Pardo<\/span><\/a><\/div><div class=\"saboxplugin-desc\"><div><p>Dimas P.L., de la lejana y ex\u00f3tica Vega Baja, CasiMurcia, periodista, redactor, taumaturgo del contenido y campe\u00f3n de espantar palomas en los parques. Actualmente resido en Madrid donde trabajo como palad\u00edn de la comunicaci\u00f3n en Pandora FMS y periodista freelance cultural en cualquier medio que se ofrezca. Tambi\u00e9n me vuelvo loco escribiendo y recitando por los c\u00edrculos po\u00e9ticos m\u00e1s profundos y oscuros de la ciudad.<\/p><p>Dimas P.L., from the distant and exotic Vega Baja, CasiMurcia, journalist, editor, thaumaturgist of content and champion of scaring pigeons in parks. I currently live in Madrid where I work as a communication champion in Pandora FMS and as a freelance cultural journalist in any media offered. I also go crazy writing and reciting in the deepest and darkest poetic circles of the city.<\/p><\/div><\/div><div class=\"clearfix\">\u00a0<\/div><div class=\"saboxplugin-socials\">\u00a0<\/div><\/div><\/div><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"38636\" class=\"elementor elementor-38636\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7400e5a2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7400e5a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;58112d0&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-131f5cf2\" data-id=\"131f5cf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1114ae95 elementor-widget elementor-widget-text-editor\" data-id=\"1114ae95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About PandoraFMS<\/strong><br>\nPandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.<br>\nOf course, one of the things that Pandora FMS can control is the hard disks of your computers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Here, in our beloved Pandora FMS blog, we have talked a [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[474,488,61],"tags":[475,489],"class_list":["post-59879","post","type-post","status-publish","format-standard","hentry","category-pandorafms","category-488","category-press-release","tag-pandorafms","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The most dangerous computer viruses in history - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pandorafms.com\/blog\/computer-virus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The most dangerous computer viruses in history - Version 2\" \/>\n<meta property=\"og:description\" content=\"Here, in our beloved Pandora FMS blog, we have talked a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pandorafms.com\/blog\/computer-virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-14T12:49:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-22T06:31:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/11\/659-2-1-980x540.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/11\\\/the-most-dangerous-computer-viruses-in-history\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"The most dangerous computer viruses in history\",\"datePublished\":\"2022-11-14T12:49:32+00:00\",\"dateModified\":\"2023-02-22T06:31:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/11\\\/the-most-dangerous-computer-viruses-in-history\\\/\"},\"wordCount\":1148,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/659-2-1-980x540.png\",\"keywords\":[\"Pandorafms\",\"2022\"],\"articleSection\":[\"PandoraFMS\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/11\\\/the-most-dangerous-computer-viruses-in-history\\\/\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/\",\"name\":\"The most dangerous computer viruses in history - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/659-2-1-980x540.png\",\"datePublished\":\"2022-11-14T12:49:32+00:00\",\"dateModified\":\"2023-02-22T06:31:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/659-2-1-980x540.png\",\"contentUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/659-2-1-980x540.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/computer-virus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The most dangerous computer viruses in history\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The most dangerous computer viruses in history - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pandorafms.com\/blog\/computer-virus\/","og_locale":"en_US","og_type":"article","og_title":"The most dangerous computer viruses in history - Version 2","og_description":"Here, in our beloved Pandora FMS blog, we have talked a [&hellip;]","og_url":"https:\/\/pandorafms.com\/blog\/computer-virus\/","og_site_name":"Version 2","article_published_time":"2022-11-14T12:49:32+00:00","article_modified_time":"2023-02-22T06:31:43+00:00","og_image":[{"url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/11\/659-2-1-980x540.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pandorafms.com\/blog\/computer-virus\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/11\/the-most-dangerous-computer-viruses-in-history\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"The most dangerous computer viruses in history","datePublished":"2022-11-14T12:49:32+00:00","dateModified":"2023-02-22T06:31:43+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/11\/the-most-dangerous-computer-viruses-in-history\/"},"wordCount":1148,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/computer-virus\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/11\/659-2-1-980x540.png","keywords":["Pandorafms","2022"],"articleSection":["PandoraFMS","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/11\/the-most-dangerous-computer-viruses-in-history\/","url":"https:\/\/pandorafms.com\/blog\/computer-virus\/","name":"The most dangerous computer viruses in history - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pandorafms.com\/blog\/computer-virus\/#primaryimage"},"image":{"@id":"https:\/\/pandorafms.com\/blog\/computer-virus\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/11\/659-2-1-980x540.png","datePublished":"2022-11-14T12:49:32+00:00","dateModified":"2023-02-22T06:31:43+00:00","breadcrumb":{"@id":"https:\/\/pandorafms.com\/blog\/computer-virus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pandorafms.com\/blog\/computer-virus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pandorafms.com\/blog\/computer-virus\/#primaryimage","url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/11\/659-2-1-980x540.png","contentUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2022\/11\/659-2-1-980x540.png"},{"@type":"BreadcrumbList","@id":"https:\/\/pandorafms.com\/blog\/computer-virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The most dangerous computer viruses in history"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fzN","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/59879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=59879"}],"version-history":[{"count":9,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/59879\/revisions"}],"predecessor-version":[{"id":59926,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/59879\/revisions\/59926"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=59879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=59879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=59879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}