Ad
related to: worms in information security
Search results
Results from the WOW.Com Content Network
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. [1] It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
August 2005: Zotob is a computer worm which exploits security vulnerabilities in Microsoft operating systems like Windows 2000, including the MS05-039 plug-and-play vulnerability (CVE-2005-1983). This worm has been known to spread on Microsoft-ds or TCP port 445.
Exploited Microsoft Internet Information Services to deface web pages and DOS a few set IPs. Code Red II: August 4, 2001 Exploited Microsoft Internet Information Server security holes. Conficker: Downup, Downadup, Kido November 21, 2008 Daprosy Worm: Worm.Win32.VB.arz, W32.Autorun.worm.h, W32/Autorun-AMS, Worm:Win32/Autorun.UD Trojan Mass mailer
The Witty worm was a computer worm that attacked the firewall and other computer security products written by a particular company, the Internet Security Systems (ISS) now IBM Internet Security Systems. It was the first worm to take advantage of vulnerabilities in the very pieces of software designed to enhance network security, and carried a ...
Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. [2] It uses flaws in Windows OS software (MS08-067 / CVE-2008-4250) [3] [4] and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually difficult to counter because of its combined use ...
The Morris worm has sometimes been referred to as the "Great Worm," due to the devastating effect it had on the Internet at that time, both in overall system downtime and in psychological impact on the perception of security and reliability of the Internet. The name was derived from the "Great Worms" of Tolkien: Scatha and Glaurung. [14]
German govware works by exploiting security gaps unknown to the general public and accessing smartphone data before it becomes encrypted via other applications. [ 13 ] Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojans are becoming more common.
The worm showed a vulnerability in software distributed with IIS, described in Microsoft Security Bulletin MS01-033 (CVE-2001-0500), [5] for which a patch had become available a month earlier. The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated letter 'N' to ...
Ad
related to: worms in information security