Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Computer worm


Related Topics

In the News (Tue 20 Aug 19)

  
  New computer worm attacks bulletin boards - Security- msnbc.com
A new computer worm that attacks bulletin board services spread silently and quickly around the Internet Tuesday, infecting at least 38,000 systems within a few hours, experts said.
As a network-based worm, the malicious program is capable of making the rounds quickly without any user interaction, such as clicking on an e-mail attachment.
The first infected computer may attack a dozen or more machines, each of which in turn attacks another dozen, and so on.  Even after just four or five levels -- like generations in a family tree -- the attack is widespread. 
www.msnbc.msn.com /id/6742668   (499 words)

  
  Computer Worm (Definition)   (Site not responding. Last check: )
Worms are very similar to viruses in that they are computer programs that replicate themselves and that often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.
The difference is that unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs.
A worm can spread itself automatically over the network from one computer to the next.
www.bsu.edu /ucs/article/0,1370,6313-1985-4488,00.html   (87 words)

  
 Computer Crime
There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate.
The victim computer responds to each ping, but because the zombie computers gave false source addresses for their pings, the victim computer is unable to establish a connection with the zombie computers.
To attempt to blame these individuals [i.e., computer systems administrators] for the success of the Worm is equivalent to blaming an arson victim because she didn't build her house of fireproof metal.
www.rbs2.com /ccrime.htm   (7340 words)

  
 USATODAY.com - Worst of computer worm appears to be over   (Site not responding. Last check: )
NEW YORK — The fast-spreading computer worm dubbed Slammer that caused a global traffic jam on the Internet Saturday is unlikely to create major disruptions this week, but it may spark fresh debate on computer network security.
The worm, considered by some security experts to be the most dangerous since the Code Red worm of 2001, was thwarted in two ways, experts say.
Worms move from one computer to another without the help of human interaction.
www.usatoday.com /tech/news/2003-01-27-worm_x.htm   (496 words)

  
 Year of the Worm | CNET News.com
The worms created with such generators can vary from benign mass mailers that clog e-mail gateways to vicious code that is the equivalent of the Ebola virus to computers.
These worms are modeled after the Cornell Internet Worm, which overloaded an estimated 3,000 to 4,000 servers, or about 5 percent of those connected to the early Internet, in November 1988.
Unlike worms and viruses, the purpose of a Trojan horse is not to spread, but to have a particular target--that is, a computer's owner--to run the program.
news.com.com /2009-1001-254061.html   (2042 words)

  
 ABC News: Computer Worm Set to Destroy Files
Computer users should make sure their software is turned on and has the latest definitions, generally available for free from the software vendor's Web site.
Alperovitch said that unlike most worms unleashed in the past five years that are designed to "phish" for personal information or send spam, BlackWorm is "kind of a throwback to old times" when worms carried destructive capabilities.
The worm hits the third of every month, so if the computer's local calendar settings are off, Hypponen said, files may be destroyed sooner or later, even if the computer is never turned on Friday.
abcnews.go.com /Technology/story?id=1569793&CMP=OTC-RSSFeeds0312   (620 words)

  
 Gay News From 365Gay.com   (Site not responding. Last check: )
Computers in the Senate chamber and the offices of every senator were infected.
It was first noticed Monday night and by Tuesday morning the worm, one of the many variants of the Rbot worm, had infected every computer in the Senate system.
Police are trying to determine the source of the worm but admit that it may be an impossible task.
www.365gay.com /newscon04/11/112404gayWorm.htm   (373 words)

  
 Network Security, Vulnerability Assessment, Intrusion Prevention   (Site not responding. Last check: )
Therefore every computer infected by this worm is going to go through the same list of "random" IP addresses.
During testing we noticed that sometimes the worm does not execute "normally" and will continue to spawn new threads until the infected machine crashes and has to be rebooted, effectively killing itself.
The code on the stack jumps into the worm code that is held in the body of the initial HTTP request.
www.eeye.com /html/Research/Advisories/AL20010717.html   (3005 words)

  
 CNN.com - 'Lovegate' computer worm spreading - Feb. 25, 2003
An Internet e-mail worm that leaves a back door on infected systems for possible future attacks spread quickly through Asia and Europe on Monday but slowed down as U.S. companies updated their anti-virus software, a computer security researcher said.
Once a computer user clicks on the attachment, the worm -- a self-propagating computer virus -- spreads by sending itself to recipients listed in an infected computer's address book, he said.
If the computer is running Microsoft Corp.'s Outlook or Outlook Express e-mail programs the worm automatically replies to new incoming e-mails using the same subject line as the original message.
www.cnn.com /2003/TECH/internet/02/25/computer.worm.reut   (297 words)

  
 Germany-Computer-Worm, 1st Writethru   (Site not responding. Last check: )
Jaschan was arrested after the worm spread around the world, exploiting a flaw in the company's Windows 2000 and Windows XP operating systems.
The worm snarled tens of thousands of computers and caused Internet traffic to slow, and German prosecutors estimate that the damage ran into the millions of dollars.
The teenager was arrested sitting at his computer at the house of his mother, who runs a computer store in the small northern town of Waffensen.
www.cbc.ca /cp/world/050708/w070844.html   (587 words)

  
 BBC NEWS | Technology | New internet worm warning
Security experts are urging people to patch their computer systems to avoid the attentions of any web worm written to take advantage of these new loopholes.
Users with vulnerable computers are being urged to download a patch for the flaws and protect their systems.
Before MSBlast many worms, which travel round the net by themselves, were happy simply to swamp net connections with traffic as they searched for new servers and computers to infect.
news.bbc.co.uk /1/hi/technology/3119316.stm   (513 words)

  
 CNN.com - Computer worm grounds flights, blocks ATMs - Jan. 26, 2003
A fast-moving computer worm snarled business and government computers Saturday, slowing some corporate systems to the point of inaccessibility.
Worms of this nature are often precursors to a different type of attack called "distributed denial of service." In that case, computers infected with a worm or other program are directed to send a flood of information to a specific Internet location and force it off-line.
In many cases, a worm's creator brags about his or her activities online and is caught that way.
cnn.com /2003/TECH/internet/01/25/internet.attack   (878 words)

  
 Speedy Worm Invades E-Mail In-Boxes (TechNews.com)
The more immediate problem for computers infected with the worm is that they will automatically allow the virus's authors to connect remotely and upload files such as malicious software to forward spam e-mails.
Network worms, unlike e-mail worms, spread through known security holes in operating systems and computer software and do not require users to do anything to be infected or spread the infection.
Computer security experts said Mydoom is spreading rapidly because it uses several layers of "social engineering" -- subtle means of psychological persuasion -- to get people to open the attachment.
www.washingtonpost.com /wp-dyn/articles/A50582-2004Jan26.html?nav=hptop_tb   (565 words)

  
 The Morris Internet Worm   (Site not responding. Last check: )
The primary difference between worms and other illicit computer programs (often referred to as viruses) is the method of operation the programs use in order to reproduce and spread.
When a standard computer virus enters a computer (almost always via an infected disk) it alters a system file, or some other convenient file which is likely to be used sometime in the near future.
The first major distinction here, at least in comparison with worms, is that, until the user (inadvertently) activates the virus, the virus is dormant on the computer.
www.snowplow.org /tom/worm/worm.html   (754 words)

  
 News 14 Carolina | 24 Hour Local News | Anson   (Site not responding. Last check: )
Hundreds of thousands of computers were believed to be infected, but security vendors said that many companies and individuals had time to clean up their machines following the alarm.
Assuming the computer's calendar settings are correct, users can also avoid the worm by leaving their machines off until Saturday, although the worm is set to trigger again on March 3.
The worm has been circulating for weeks, but it is set to destroy files only on the third day of each month.
www.news14charlotte.com /content/local_news/anson?AC=&ArID=112613&SecID=4   (855 words)

  
 Technology News: Security : Swen Worm Infects Over 1.5 Million Computers
The Swen computer worm is turning out to be a bigger problem than earlier expected, using a brief head start on computer antivirus defenses, as well as complex abilities and an effective masquerade, to infect Windows machines and spread via e-mail to many users.
Classified as a worm because of its ability to copy itself without infecting host files, Swen represents a high level of sophistication in its ability to execute code automatically, its deceptive spoof of Microsoft correspondence and its randomization of information that could be used to identify it, according to Sunner.
Sunner likened the worm to the original Gibe worm, but said it was written in C++ and also used an SMTP engine, adding to the indications of a highly sophisticated author.
www.technewsworld.com /perl/story/31632.html   (905 words)

  
 Computer worm poses as e-mail from FBI, CIA - 11/24/05 - The Detroit News   (Site not responding. Last check: )
The worm -- named "Sober X" -- has spread so far so fast that the CIA and the FBI put prominent warnings on their Web sites making clear that they did not send out the e-mail and urging people to not open the attachment.
Still, the Sober worm was listed as only a "medium-risk" worm by security companies, which noted that it was not as widespread as others in recent years, notably MyDoom, which hit computers systems early last year.
The FBI is investigating the source of the attack, which closely resembles an e-mail worm that surfaced in February, Milhoan said, though she declined to comment on the progress of that investigation.
www.detnews.com /apps/pbcs.dll/article?AID=/20051124/BIZ04/511240362   (877 words)

  
 Protect Your Computer From Viruses And Worms
If you were told recently that your computer has a worm, you'd have very likely gone through a tedious process of cleaning your computer of the worm and maybe a bunch of other viruses.
Computers infected with a virus or worm are commonplace nowadays in a wired world.
There is also an articles section where our users contribute and share their knowledge and experiences regarding computer virus protection.
www.emailantivirus.info   (236 words)

  
 Computer worm exploits software on Sony's CDs - The Boston Globe
Symantec Corp., the leading maker of antivirus software, said the worm has infected computers that played Sony BMG recordings.
Or they could make the computer send spam messages to other Internet computers, or launch ''denial of service" attacks that could put major Internet services out of commission.
Sony has faced intense criticism from computer security experts and consumers for adding the software to popular music titles in an effort to prevent illegal duplication of copyrighted songs.
www.boston.com /business/technology/articles/2005/11/11/computer_worm_exploits_software_on_sonys_cds   (377 words)

  
 New Scientist Tech - Breaking News - Computer worm 'sniffs' out passwords
The first computer worm to eavesdrop on network traffic after it infects a computer has been discovered by security experts.
The worm tries to exploit one of a number of bugs in the Windows operating system to wriggle on to computers.
Other worms employ infected computers to launch an assault on a web server or send spam, which is much easier for a network administrator to spot because a machine churns out a lot of extra traffic.
www.newscientisttech.com /channel/tech/electronic-threats/dn6398   (458 words)

  
 Turkey, Moroccan residents arrested in computer worm probe - Aug. 26, 2005
Computer services of CNN, ABC News, The New York Times, the U.S. Senate, the Centers For Disease Control and Prevention, Daimler Chrysler and U.S. Immigration and Customs Enforcement were among those affected by the worm, officials said.
While this worm was not as widespread as other Internet scourges, it got a lot of attention because of the high-profile places it hit.
Computer security companies encourage users of the Windows 2000 operating system to use anti-virus and anti-spyware programs to make sure the machine is not being used as part of a "zombie network," even if there are no signs of infection.
money.cnn.com /2005/08/26/technology/worm_arrest   (1213 words)

  
 McAfee — Computer Anti-Virus Software and Internet Security For Your PC
The worm is able to propagate over the network by copying itself to network shares (assuming sufficient permissions exist).
The worm mails itself to email addresses in the Windows Address Book, and to addresses extracted from files on the victim's machine.
The worm may send a clean document in addition to an infected file.
us.mcafee.com /virusInfo/default.asp?id=description&virus_k=99455   (653 words)

  
 Examples of Malicious Computer Programs
A description of some malicious computer programs since mid-2002, with emphasis on the nonexistent or lenient punishment for their authors, and with links to legal documents, is contained in my second essay.
Corporate victims of computer crimes are often reluctant to disclose the amount of damage done, perhaps because such admissions might erode public confidence in the company's technical competence, which might cause customers/clients to flee to competitors.
If N computers are infected and the average cost of removing the virus or worm from one computer is $ M, then the total damage is $ N × M. In practice, neither N nor M are known with the precision required for admission of legal evidence in court.
www.rbs2.com /cvirus.htm   (12995 words)

  
 ABC News: Windows Users Battle New Computer Worm   (Site not responding. Last check: )
The worm is causing the most problems at companies with large, networked computer systems, rather than among individual computer users, said David Perry, a security analyst at Trend Micro Inc., a computer security company.
Perry said the worm copies itself and then searches networks for other unprotected machines, causing no damage to data but clogging networks and occasionally rebooting its host computer.
He called the worm's effects "small potatoes" in terms of the potential damage, and anticipated that corporate information technology staffs would quickly neutralize the worms.
abcnews.go.com /Technology/wireStory?id=1044187   (375 words)

  
 Computer Virus/Computer Worm Infected CHVL.splitrock.net Computers
Also know that if your computer does not appear on this page, it may still be infected: the only computers on this page are those we have reason to suspect are infected, either from a message we have received or from a report we have received from someone else.
If you believe that your computer is infected or to learn how to determine if your computer is infected, please follow the guidelines and disinfect as quickly as possible.
If you believe that your computer is infected, if you can, please refrain from connecting to the network until such time as you can disinfect fully, as each time you connect, your computer sends more infected attachments to others.
www.itc.virginia.edu /desktop/email/virus/splitrock.html   (862 words)

  
 Barron News Shield - Computer worm hits clinic computers   (Site not responding. Last check: )
A computer worm knocked out about two-thirds of the computers at the Barron Luther Midelfort clinic on Aug. 16.
DCS Netlink of Rice Lake was both equally aware of the worm outbreak and equally absent of phone calls requesting assistance with the worm's removal as of Aug. 17.
Eric Prill, a Mac computer tech for the Altoona firm MacMan, said he had not heard of the attack as of Aug. 17, but neither had he ever heard of a Mac computer contracting a virus.
www.zwire.com /site/news.cfm?newsid=15139442&BRD=1132&PAG=461&dept_id=157660&rfi=6   (383 words)

  
 CBC News: Computer worm exploits SARS fears   (Site not responding. Last check: )
Computer security experts at Global Hauri rate it as a medium risk and those at Symantec Corp., McAfee Security and Sophos consider it a low risk.
If a computer is infected, the worm searches for e-mail addresses in the Windows address book and uses its own built-in mail program to spread itself.
The worm also changes the start page of Internet Explorer to a World Health Organization Web page on the SARS outbreak.
www.cbc.ca /stories/2003/04/23/coronex_worm030423   (326 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.