Skip to main content

Worm

What Are Computer Worms and How Can I Protect Myself From Them?

Computer worms are a form of malware that have the capability to rapidly infect many computers on a network by sending copies of themselves from one system to another over network connections.
The Melissa worm in 1999, Sobig worms in 2003 and MyDoom worm in 2004 all propagated through email in the form of attachments. The emails enticed users to open the attachments, which then installed the worms on the target systems. MyDoom was also able to spread itself though a peer-to-peer file sharing program known as KaZaA. Other worms have found their way into networks through network services such as database or web servers. But wait, there's more!
More recently worms have started showing up in social media forums.  Trend Micro’s Malware Labs recently discovered a worm that propagates through private IM messages on Facebook.
Once installed, worms can do all sorts of damage like setting up Trojans that can be used to control your computer system to steal personal information or attack other systems as part of a botnet – a collection of computers that have been hacked to work together to attack other computer systems under the control of an external botnet master system.
How to Protect Yourself From Worms
It can be difficult to get rid of malware like viruses, Trojans, and worms once they infect a system, so it’s always best to prevent them from getting onto your computer in the first place.
Use a personal firewall to block external access to network services.  It’s easy to forget about this part of your protection, but it is very important.  Without a firewall your computer system is fully exposed to attack on the Internet, particularly when you are using public Wi-Fi systems at cafes and your local library.
You should use care when clicking on links in social media and email messages.  If you don’t’ know where the messages came from or you do know but don’t trust the senders, then don’t click on the links.  Of course it’s easy to make a mistake in this regard so you should have good anti-malware protection installed on your computer.
Trend Micro’s Smart Protection Network™ provides comprehensive protection against worms, viruses, and Trojans. For example, SPN detects the aforementioned Facebook worm is detected as WORM_STEKT.EVL. You can get advanced SPN protection with Trend Micro™ Titanium™ Maximum Security for Windows and Trend Micro™ Titanium™ Internet Security for Mac.
                                                                                      Only For Educational Purposes

Comments

Popular posts from this blog

Best Android Emulators

AMIDuOS Price:  Free Trial / $10-$15 DOWNLOAD FROM AMIDUOS! AMIDuOS is first on our list and this is a relatively newer Android emulator for PC. This one comes in two flavors: Lollipop and Jelly Bean. Aside from the version type, the only other difference between the two is Jelly Bean costs $10 while Lollipop costs $15. The good news is that those are one-time charges. AMIDuOS runs very well for multiple purposes. Most of its features are for productivity rather than gaming. That makes it a good option for office use, homework, and similar tasks. There aren't any specific gaming features, but it does run games rather well. Developers could use it for basic testing, but it won't be great for advanced stuff. It's good overall and worth a chance. Android Studio's emulator Price:  Free DOWNLOAD ON GOOGLE PLAY Android Studio is the Google-approved development IDE for Android. It comes with a bunch of tools to help developers make app

Copyright Infrigment

#1: Protect Your Content and Website With Terms of Use and Disclaimers Terms of Use is a website policy (which sometimes is also called Terms of Service or Terms & Conditions) that protects your  blog content  (and your business) by outlining what visitors can and cannot do with the information on your site. You may think the necessity of saying something like, “You agree that you will not modify, copy, reproduce, sell, or distribute any content in any manner or medium without permission” is obvious. However, having this legal language on your website strengthens your position when someone does steal your content. Your website is often the storefront of your business, and specific legal policies will protect not only your content but your business and income as well. As a blogger, keep in mind that although you may not own the content that readers share in your  Comments section , you still have the right to manage it so your Terms should outline this as well. To  create

First democratic Era

In 1947, the  founding fathers  of Pakistan agreed to appoint  Liaquat Ali Khan  as  the country's   first   Prime minister  with the  founder of Pakistan ,  Muhammad Ali Jinnah , tenuring as both first  Governor-General  and  Speaker  of the  State Parliament . [36]  Mountbatten had offered to serve as Governor-General of both India and Pakistan but Jinnah refused this offer and opted to become the Governor-General of Pakistan himself. [37] When Jinnah died of tuberculosis in 1948, [38]  Islamic scholar  Maulana Shabbir Ahmad Usmani  described Jinnah as the greatest Muslim after the Mughal Emperor  Aurangzeb  and also compared Jinnah's death to the  Prophet 's passing.  Usmani  asked Pakistanis to remember Jinnah's message of Unity, Faith and Discipline and work to fulfil his dream ''to create a solid bloc of all Muslim states from Karachi to Ankara, from Pakistan to Morocco. He [Jinnah] wanted to see the Muslims of the world united under the banner of Isla