Skip to main content

Worm

What Are Computer Worms and How Can I Protect Myself From Them?

Computer worms are a form of malware that have the capability to rapidly infect many computers on a network by sending copies of themselves from one system to another over network connections.
The Melissa worm in 1999, Sobig worms in 2003 and MyDoom worm in 2004 all propagated through email in the form of attachments. The emails enticed users to open the attachments, which then installed the worms on the target systems. MyDoom was also able to spread itself though a peer-to-peer file sharing program known as KaZaA. Other worms have found their way into networks through network services such as database or web servers. But wait, there's more!
More recently worms have started showing up in social media forums.  Trend Micro’s Malware Labs recently discovered a worm that propagates through private IM messages on Facebook.
Once installed, worms can do all sorts of damage like setting up Trojans that can be used to control your computer system to steal personal information or attack other systems as part of a botnet – a collection of computers that have been hacked to work together to attack other computer systems under the control of an external botnet master system.
How to Protect Yourself From Worms
It can be difficult to get rid of malware like viruses, Trojans, and worms once they infect a system, so it’s always best to prevent them from getting onto your computer in the first place.
Use a personal firewall to block external access to network services.  It’s easy to forget about this part of your protection, but it is very important.  Without a firewall your computer system is fully exposed to attack on the Internet, particularly when you are using public Wi-Fi systems at cafes and your local library.
You should use care when clicking on links in social media and email messages.  If you don’t’ know where the messages came from or you do know but don’t trust the senders, then don’t click on the links.  Of course it’s easy to make a mistake in this regard so you should have good anti-malware protection installed on your computer.
Trend Micro’s Smart Protection Network™ provides comprehensive protection against worms, viruses, and Trojans. For example, SPN detects the aforementioned Facebook worm is detected as WORM_STEKT.EVL. You can get advanced SPN protection with Trend Micro™ Titanium™ Maximum Security for Windows and Trend Micro™ Titanium™ Internet Security for Mac.
                                                                                      Only For Educational Purposes

Comments

Popular posts from this blog

Best Android Emulators

AMIDuOS Price:  Free Trial / $10-$15 DOWNLOAD FROM AMIDUOS! AMIDuOS is first on our list and this is a relatively newer Android emulator for PC. This one comes in two flavors: Lollipop and Jelly Bean. Aside from the version type, the only other difference between the two is Jelly Bean costs $10 while Lollipop costs $15. The good news is that those are one-time charges. AMIDuOS runs very well for multiple purposes. Most of its features are for productivity rather than gaming. That makes it a good option for office use, homework, and similar tasks. There aren't any specific gaming features, but it does run games rather well. Developers could use it for basic testing, but it won't be great for advanced stuff. It's good overall and worth a chance. Android Studio's emulator Price:  Free DOWNLOAD ON GOOGLE PLAY Android Studio is the Google-approved development IDE for Android. It comes with a bunch of tools to help developers make app...

Copyright Infrigment

#1: Protect Your Content and Website With Terms of Use and Disclaimers Terms of Use is a website policy (which sometimes is also called Terms of Service or Terms & Conditions) that protects your  blog content  (and your business) by outlining what visitors can and cannot do with the information on your site. You may think the necessity of saying something like, “You agree that you will not modify, copy, reproduce, sell, or distribute any content in any manner or medium without permission” is obvious. However, having this legal language on your website strengthens your position when someone does steal your content. Your website is often the storefront of your business, and specific legal policies will protect not only your content but your business and income as well. As a blogger, keep in mind that although you may not own the content that readers share in your  Comments section , you still have the right to manage it so your Terms should outline this as well....

APS Peshawar Attack 16-12-14

On 16 December 2014, six gunmen affiliated with the  Tehrik-i-Taliban  (TTP) conducted a terrorist attack on the  Army Public School  in the northwestern Pakistani city of  Peshawar . The militants, all of whom were foreign nationals, included one  Chechen , three  Arabs  and two  Afghans . They entered the school and opened fire on school staff and children, [6] [8]  killing  149  people including 132 schoolchildren, ranging between eight and eighteen years of age making it the world's second  deadliest school massacre . [9] [10]  A rescue operation was launched by the  Pakistan Army 's  Special Services Group  (SSG) special forces, who killed all six terrorists and rescued 960 people. [6] [11] [12] According to various news agencies and commentators, the nature and preparation of the attack was very similar to that of the  Beslan school hostage crisis  that occurred in the  North Os...