>

Discover, learn and create every day.

Digital culture 28 Jan 2026

The origin of computer viruses

The origin of computer viruses

When software began to “infect” computers

Today, we associate computer viruses with data theft, ransomware, and large-scale attacks. But the first viruses were not created for money or espionage. They were experiments, technical pranks… and demonstrations of power. Understanding how viruses originated helps explain why digital security is so important today.

Before viruses: a network based on trust

In the 1970s and 1980s, the world of computing was very different. Computers were mostly in universities, laboratories, and large companies. Users were technicians, researchers, or students.

Systems were designed with an implicit idea: those who have access are trusted. Little thought was given to attacks, sabotage, or massive data theft. 
This context made it possible for someone to ask a troubling question: “What if a program could copy itself and move from one computer to another?”

1971: the first “virus” in history (which was not malicious)

What is often considered the first precursor of a virus is Creeper, created in 1971.

It was an experimental program that:

- moved between computers connected to ARPANET (the predecessor of the Internet)
- displayed a message: “I’m the creeper, catch me if you can!”
- did no harm and destroyed nothing

It was more of a technical experiment than an attack. It aimed to demonstrate that a program could “travel” across a network. Shortly after, Reaper was created, another program that removed Creeper. It was, ironically, the first “antivirus.”

This is where the key concept was born: software that spreads autonomously.

1982: the first virus for personal computers

With the arrival of personal computers, the risk multiplied. A 15-year-old student, Rich Skrenta, created Elk Cloner, considered the first virus to spread “in real life.” It infected Apple II computers via floppy disks.
When the system booted, the virus copied itself to other disks. After several uses, it displayed a short poem on the screen. It did not destroy data.
It was a joke, but it demonstrated something very serious: users could infect each other without knowing it.

1986: the first PC virus to spread worldwide

The Brain virus, created by two brothers in Pakistan, is considered the first mass PC virus for IBM-compatible computers.
It infected the boot sector of floppy disks. When someone booted the computer with an infected disk, the virus loaded into memory and began spreading.
Interestingly, the creators left their name, address, and phone number in the code. They wanted to “punish” illegal software copies, not cause global chaos.

Still, Brain demonstrated that:

- a virus could cross borders
- propagation could be out of control
- creators could not foresee the real impact

When viruses stop being jokes

In the late 80s and early 90s, the landscape changed. Viruses were no longer academic experiments or student pranks.

Programs began to appear that:

- deleted files
- corrupted systems
- caused the loss of important information

The motivation also changed: from technical curiosity → sabotage, fame, or malicious intent.
Users were no longer just expert technicians. There were companies, schools, and individuals without advanced knowledge. The impact was much greater.

The Internet changes everything

With the expansion of the Internet in the 1990s, viruses no longer relied solely on floppy disks. They could now:

- arrive via email
- be downloaded from a website
- exploit system vulnerabilities

This led to worms, programs that spread themselves across the network without user intervention.

A single system error could become a worldwide infection in hours.

The great historical lesson

Computer viruses did not appear because the Internet was “bad.” They appeared because systems were created in a trusted environment, without imagining future scale.

History shows a clear pattern:

1. A technology is created to make life easier.
2. Functionality is prioritized over security.
3. Someone discovers how to exploit weaknesses.
4. Security arrives later, as a response.

Even today, the same happens with apps, smart devices, and cloud services.

What conclusions can we draw?

Although current viruses are much more sophisticated, the root is the same: exploiting trust and human distractions.

That’s why basic measures remain essential:

- update systems
- don’t open suspicious files
- back up data
- use antivirus protection
- distrust what seems too urgent or too good

Technology has evolved, but human vulnerability remains the main entry point.

From the lab to global digital crime

What started as technical experiments and youthful pranks is now a multimillion-dollar criminal industry.

But understanding the origin of viruses reminds us of something important: security is not an add-on. It must be part of the design from the start.

Because on the Internet, any small weakness can scale to affect millions of people.

Back to Blog