If you suspect your devices are infected with a computer worm, run a virus scan immediately. In addition to wreaking havoc on a computer’s resources, worms can also steal data, install a backdoor, and allow a hacker to gain control over a computer and its system settings. Sometimes a computer worm’s purpose is only to make copies of itself over and over - depleting system resources, such as hard drive space or bandwidth, by overloading a shared network. Worms can modify and delete files, and they can even inject additional malicious software onto a computer. Once it’s installed, the worm silently goes to work and infects the machine without the user’s knowledge. Once opened, these files could provide a link to a malicious website or automatically download the computer worm. Or computer worms could arrive as attachments in spam emails or instant messages (IMs). Worms can be transmitted via software vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |