Not to be confused with Timeline of computer viruses and worms.
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
This article needs to be updated. Please help update this article to reflect recent events or newly available information.(January 2016)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Comparison of computer viruses" – news · newspapers · books · scholar · JSTOR(May 2021) (Learn how and when to remove this template message)
(Learn how and when to remove this template message)
The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.
Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus, in which cases, it is often renamed. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b". Again, depending on how quickly this happens, the old name may persist.
and 19 Related for: Comparison of computer viruses information
compilation of a unified list ofcomputerviruses is made difficult because of naming. To aid the fight against computerviruses and other types of malicious...
"infected" with a computervirus, a metaphor derived from biological viruses. Computerviruses generally require a host program. The virus writes its own...
media related to Computer worms. Timeline of notable computerviruses and worms Comparisonofcomputerviruses List of trojan horses "Virus'". ecsis.ecsis...
includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like computer operating...
a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computerviruses, hence...
ISBN 3-540-22420-3. Timeline of notable computerviruses and worms ComparisonofcomputervirusesComputerviruses Polymorphic code Virus Creation Laboratory v...
Antivirus software Comparisonof firewalls International Computer Security Association Internet Security List ofcomputervirusesVirus Bulletin uses http...
Violations of IT facilities. Exploit (computer security) Timeline ofcomputerviruses and worms Comparisonofcomputerviruses Malware analysis XML denial-of-service...
is not set to read-only. List ofcomputer worms Timeline ofcomputerviruses and worms Comparisonofcomputerviruses E-mail spam Malware Stephen Watkins;...
This is a list of biological virus upper-level taxa. See also Comparisonofcomputerviruses This is an alphabetical list of biological virus higher taxa...