{"id":8845,"date":"2015-11-17T11:00:33","date_gmt":"2015-11-17T16:00:33","guid":{"rendered":"https:\/\/southjerseytechies.net\/blog\/?p=8845"},"modified":"2025-05-05T00:52:58","modified_gmt":"2025-05-05T04:52:58","slug":"the-18-scariest-computer-viruses-of-all-time","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/","title":{"rendered":"The 18 scariest computer viruses of all time"},"content":{"rendered":"<h2 class=\"headline\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8848\" src=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg\" alt=\"virus\" width=\"500\" height=\"330\" data-wp-pid=\"8848\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg 400w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187-300x198.jpg 300w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187-250x165.jpg 250w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/h2>\n<p>&nbsp;<\/p>\n<h2 class=\"headline\">Anna Kournikova (2001)<\/h2>\n<p>The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star. Financial damages associated with Kournikova were limited, but the virus had a big pop culture impact: It became a plot point in a 2002 episode of the sitcom <em>Friends<\/em>.<\/p>\n<h2 class=\"headline\">Sasser (2004)<\/h2>\n<p>In April 2004, Microsoft issued a patch for a vulnerability in Windows\u2019 Local Security Authority Subsystem Service (LSASS). Shortly after, a teenager in Germany released\u00a0the Sasser worm to exploit the vulnerability in unpatched machines. Multiple variants of Sasser took out airline, public transportation, and hospital networks, causing $18 billion in damage.<\/p>\n<h2 class=\"headline\">Skulls.A (2004)<\/h2>\n<p>The Skulls.A is a legitimately spooky mobile trojan that affected the Nokia 7610 smartphone and other SymbOS devices. The malware was designed to change all icons on infected phones to Jolly Rogers and disable all phone functions, save for making and receiving calls.<\/p>\n<p>F-Secure says Skulls.A caused little damage, but the trojan is undeniably creepy.<\/p>\n<h2 class=\"headline\">Zeus (2009)<\/h2>\n<p>While many malware programs on this list are little more than nuisances,\u00a0Zeus (AKA Zbot) was a tool used by a complex criminal enterprise.<\/p>\n<p>The trojan uses phishing and keylogging to steal online banking credentials, draining a cumulative $70 million from the accounts of its victims.<\/p>\n<h2 class=\"headline\">Melissa (1999)<\/h2>\n<p>Named after a Florida stripper, the Melissa virus was designed to propagate by sending itself to the first 50 contacts in its victims\u2019 e-mail Outlook address book. The attack was so successful that the virus infected 20 percent of the world\u2019s computers, causing an estimated $80 million in damage.<\/p>\n<p>Virus creator David L. Smith (shown) was caught by the FBI, served 20 months in jail, and paid a $5,000 fine.<\/p>\n<h2 class=\"headline\">Sircam (2001)<\/h2>\n<p>Like many early malware scripts, Sircam used social engineering to trick people into opening an email attachment.<\/p>\n<p>The worm chooses a random Microsoft Office file on victims\u2019 computers, infects it, and sends it to all the people in the victims\u2019 email contact list. A University of Florida study pegged\u00a0Sircam cleanup costs at $3 billion.<\/p>\n<h2 class=\"headline\">Stuxnet (2009)<\/h2>\n<p>Stuxnet is one of the first known viruses created for\u00a0cyberwarfare. Created in a joint effort between Israel and the U.S., Stuxnet targeted nuclear enrichment systems in Iran.<\/p>\n<p>Infected computers instructed nuclear centrifuges to physically spin until they broke, all while providing fake feedback that operations were normal.<\/p>\n<h2 class=\"headline\">SQL Slammer\/Sapphire (2003)<\/h2>\n<p>Taking up just 376 bytes, the\u00a0SQL Slammer worm packed a lot of destruction into a tiny package. The worm slowed down the Internet, disabled 911 call centers, took down 12,000 Bank of America ATMs, and caused much of South Korea to go offline. It also crashed the network at Ohio\u2019s Davis-Besse nuclear power plant.<\/p>\n<h2 class=\"headline\">Storm Trojan (2007)<\/h2>\n<p>Storm Trojan is a particularly sinister piece of email-distributed malware that accounted for 8 percent of all global infections just three days after its January 2007 launch.<\/p>\n<p>The trojan created a massive botnet of between 1 and 10 million computers, and because it was designed to change its packing code every 10 minutes,\u00a0Storm Trojan proved incredibly resilient.<\/p>\n<h2 class=\"headline\">Code Red (2001)<\/h2>\n<p>The\u00a0Code Red worm, named after the Mountain Dew flavor preferred by its creators, infected up to one-third of all Microsoft ISS web servers upon release.<\/p>\n<p>It even took down whitehouse.gov, replacing its homepage with a \u201cHacked by Chinese!\u201d message. Estimated damages due to Code Red were in the billions of dollars worldwide.<\/p>\n<h2 class=\"headline\">Nimda (2001)<\/h2>\n<p>Released just after the 9\/11 attack, many thought the devastating\u00a0Nimda worm had an Al Qaeda connection (never proven).<\/p>\n<p>It spread via multiple vectors, bringing down banking networks, federal courts and other key computer systems.\u00a0Cleanup costs for Nimda exceeded $500 million in the first few days alone.<\/p>\n<h2 class=\"headline\">ILOVEYOU (2000)<\/h2>\n<p>The ILOVEYOU worm, AKA Love Letter, disguised itself in email inboxes as a text file from an admirer.<\/p>\n<p>But this Love Letter was anything but sweet: In May 2000, it quickly spread to 10 percent of all Internet-connected computers, leading the CIA to shut down its own email servers to prevent its further spread. Estimated damages were $15 billion.<\/p>\n<h2 class=\"headline\">Cryptolocker (2014)<\/h2>\n<p>Computers infected with Cryptolocker have important files on their hard drives\u00a0encrypted and held at ransom. Those who pay approximately $300 in bitcoin to the hackers are given access to the encryption key; those who fail to pay have their data deleted forever.<\/p>\n<h2 class=\"headline\">Netsky (2004)<\/h2>\n<p>The\u00a0Netsky worm,\u00a0created by the same teen who made Sasser, made its way around the world by way of email attachments. The P variant of\u00a0Netsky was the most widespread worm in the world even more than two years after its February 2004 launch.<\/p>\n<h2 class=\"headline\">Conficker (2008)<\/h2>\n<p>The Conficker worm (AKA Downup, Downadup, Kido), first detected in December 2008, was designed to disable infected computers\u2019 anti-virus programs and block autoupdates that may otherwise remove it from computers.<\/p>\n<p>Conficker quickly spread to numerous important computer networks, including those of the English, French, and German armed forces, causing $9 billion in damage.<\/p>\n<h2 class=\"headline\">Michaelangelo (1992)<\/h2>\n<p>The Michelangelo virus itself spread to relatively few computers and caused little real damage. But the concept of a computer virus set to \u201cdetonate\u201d on March 6, 1992 caused a media-fueled mass hysteria, with many afraid to operate their PCs even on anniversaries of the date.<\/p>\n<h2 class=\"headline\">Sobig.F (2003)<\/h2>\n<p>The\u00a0Sobig.F trojan infected an estimated 2 million PCs in 2003, grounding Air Canada flights and causing slowdowns across computer networks worldwide. This tricky bug-in-disguise cost $37.1 billion to clean up, making it one of the most expensive malware recovery efforts in history.<\/p>\n<h2 class=\"headline\">MyDoom (2004)<\/h2>\n<p>In September 2004,\u00a0TechRepublic called MyDoom \u201cthe worst virus outbreak ever,\u201d and it\u2019s no surprise why. The worm increased the average page load time on the Internet by 50 percent, blocked infected computers\u2019 access to anti-virus sites, and launched a denial-of-service attack on computing giant Microsoft.<\/p>\n<p>The worldwide costs associated with cleanup of MyDoom is estimated to be just shy of $40 billion.<\/p>\n<h4>Have questions?<\/h4>\n<p>Get help from IT Experts\/Microsofts Cloud Solutions Partner<br \/>\nCall us at:\u00a0856-745-9990 or visit:\u00a0<a href=\"https:\/\/southjerseytechies.net\/\">https:\/\/southjerseytechies.net\/<\/a><\/p>\n<p><a title=\"South Jersey Techies Website\" href=\"http:\/\/southjerseytechies.net\/\">South Jersey Techies, LLC<\/a>\u00a0is a full\u00a0<a title=\"South Jersey Techies Managed Services\" href=\"http:\/\/southjerseytechies.net\/\">Managed Web and Technology Services Company<\/a>\u00a0providing\u00a0IT Services,\u00a0<a title=\"South Jersey Techies:  Web Design\" href=\"http:\/\/southjerseytechies.net\/website_design.php\">Website Design Services<\/a>,\u00a0<a title=\"South Jersey Techies:  Server Support\" href=\"http:\/\/southjerseytechies.net\/server_install.php\">Server Support<\/a>,\u00a0<a title=\"South Jersey Techies:  Network Consulting\" href=\"http:\/\/southjerseytechies.net\/network_consulting.php\">Network Consulting<\/a>,\u00a0<a title=\"South Jersey Techies:  Internet Phones\" href=\"http:\/\/southjerseytechies.net\/voip.php\">Internet Phones<\/a>,\u00a0<a title=\"South Jersey Techies:  Cloud Solutions Provider\" href=\"http:\/\/southjerseytechies.net\/cloud.php\">Cloud Solutions Provider<\/a>\u00a0and much more.<a title=\"South Jersey Techies:  Contact\" href=\"http:\/\/southjerseytechies.net\/contact.php\">\u00a0Contact for More<\/a>\u00a0Information.<\/p>\n<p>To read this article in its entirety\u00a0<a href=\"https:\/\/web.archive.org\/web\/20250121214918\/https:\/\/www.techrepublic.com\/pictures\/the-18-scariest-computer-viruses-of-all-time\/\" target=\"_blank\">click here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Anna Kournikova (2001) The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star. Financial damages associated with Kournikova were limited, but the virus had a &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":8848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[473,45,142,367],"tags":[1254,1252,1256,1255,1251,1253,193],"class_list":["post-8845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-quick-reference-guides","category-security","category-virus-adware-spyware-removal","tag-code-red","tag-computer-virus","tag-computer-virus-1992-to-2014","tag-cryptolocker","tag-scariest-computer-viruses","tag-storm-trojan","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>South Jersey Techies - The 18 scariest computer viruses of all time<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"South Jersey Techies - The 18 scariest computer viruses of all time\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Anna Kournikova (2001) The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star. Financial damages associated with Kournikova were limited, but the virus had a &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-17T16:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T04:52:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"264\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"The 18 scariest computer viruses of all time\",\"datePublished\":\"2015-11-17T16:00:33+00:00\",\"dateModified\":\"2025-05-05T04:52:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\"},\"wordCount\":1015,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg\",\"keywords\":[\"Code red\",\"Computer Virus\",\"Computer Virus 1992 to 2014\",\"Cryptolocker\",\"Scariest Computer Viruses\",\"Storm Trojan\",\"Virus\"],\"articleSection\":[\"Internet Security\",\"Quick Reference Guides\",\"Security\",\"Virus \/ Adware \/ Spyware Removal\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\",\"name\":\"South Jersey Techies - The 18 scariest computer viruses of all time\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg\",\"datePublished\":\"2015-11-17T16:00:33+00:00\",\"dateModified\":\"2025-05-05T04:52:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg\",\"width\":400,\"height\":264},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 18 scariest computer viruses of all time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"South Jersey Techies - The 18 scariest computer viruses of all time","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/","og_locale":"en_US","og_type":"article","og_title":"South Jersey Techies - The 18 scariest computer viruses of all time","og_description":"&nbsp; Anna Kournikova (2001) The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star. Financial damages associated with Kournikova were limited, but the virus had a &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2015-11-17T16:00:33+00:00","article_modified_time":"2025-05-05T04:52:58+00:00","og_image":[{"width":400,"height":264,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg","type":"image\/jpeg"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"The 18 scariest computer viruses of all time","datePublished":"2015-11-17T16:00:33+00:00","dateModified":"2025-05-05T04:52:58+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/"},"wordCount":1015,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg","keywords":["Code red","Computer Virus","Computer Virus 1992 to 2014","Cryptolocker","Scariest Computer Viruses","Storm Trojan","Virus"],"articleSection":["Internet Security","Quick Reference Guides","Security","Virus \/ Adware \/ Spyware Removal"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/","url":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/","name":"South Jersey Techies - The 18 scariest computer viruses of all time","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg","datePublished":"2015-11-17T16:00:33+00:00","dateModified":"2025-05-05T04:52:58+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#primaryimage","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg","width":400,"height":264},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/the-18-scariest-computer-viruses-of-all-time\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"The 18 scariest computer viruses of all time"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-1893187.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-2iF","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=8845"}],"version-history":[{"count":7,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8845\/revisions"}],"predecessor-version":[{"id":14773,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8845\/revisions\/14773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media\/8848"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=8845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=8845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=8845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}