Archives - Worm


Malware madness–understanding the threat of worms

Malware: the internet’s creepy crawlies that can wreak havoc on your device. But what exactly is a worm, one type of this malicious software? Here’s the lowdown: Why is Malware a Big Deal? Think of malware as a cybercriminal’s toolbox. Here’s how it can be used to harm you: Protecting Yourself from Malware: Malware is […]

Understanding malware and how to protect yourself from it

Malware, or malicious software, is designed to infect systems and devices, harvest data therein (or otherwise compromise their normal functionality), and possibly use that information for financial gain. It’s an umbrella term for a variety of software variants, including spyware, ransomware and viruses. Hackers leverage a wide range of malware variants, and once you’ve been […]

On this day in history – Witty worm exploits holes in IBM products

March 19, 2004: The Witty worm is a record-breaking worm in many regards. It exploited holes in several IBM Internet Security Systems products. It was the first worm to take advantage of vulnerabilities in the very pieces of software designed to enhance network security, and carried a destructive payload, unlike previous worms and it spread […]

Types of Malware: What is malicious code?

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses.

On this day in history – Santy worm uses Google to spread across the Internet

December 20, 2008: Within 24 hours of its release, about 30,000 to 40,000 websites were attacked by Santy. The worm, which exploited vulnerability in phpBB software, holds a record of spreading worldwide within three hours of its release. It caused writable files (of formats such as .php and .html) on the infected servers to display […]

Types of Malware: What’s a Worm?

A type of malware that replicates itself over and over within a computer. Most cybercrime starts with malware. Cybercriminals use it to access your computer or mobile device to steal your personal information like your Social Security number, passwords, credit card information, or bank account information, to commit fraud. Once cybercriminals have your personal information, […]