updated Tue. August 13, 2024
-
E-Commerce Times
March 28, 2018
They were the victims of the Stuxnet computer worm attack that famously targeted the Iranian nuclear program. As cyberactors, the Iranians reportedly were behind APT33, a group that targeted energy, aerospace and other industries in the U.S., Saudi Arabia and South Korea. "The Iranians continue toÃâà...
The Japan Times
March 22, 2018
There were 37 reported cases of attacks using the WannaCry ransomware, a computer worm that caused global disruption in May last year. No financial damage has been reported in the country, according to the NPA. Through cooperation with the private sector, the NPA plans to gather more informationÃâà...
Security Boulevard
March 13, 2018
In the early seventies, Robert (Bob) Thomas was a researcher for BBN Technologies in Cambridge, Massachusetts. Thomas realized that a computer program can move across a network leaving a small trail wherever it went. So, he created the first computer “worm” which he named Creeper. It couldÃâà...
Computer Business Review
March 9, 2018
If you consider the first computer worm that wasn't intentionally malicious. However, it manifested itself and caused between $100,0000 and $10,000,000 worth of damage. The WannaCry attack is another example of how dangerous cyberthreats are and how they can quickly spread like wildfire. In theÃâà...
TechTarget
September 1, 2017
A computer worm is similar to a computer virus, but it has distinct characteristics. Unlike spear-phishing emails, worms do not require a delivery system; instead, they attack the ports and protocols of vulnerable systems directly, as a stand-alone program. This makes worms ideal for spreading malware, andÃâà...
CRN
May 15, 2017
The world hasn't heard too much about computer worms in recent years, at least not ones that go after the general populace and businesses. (Stuxnet, of course, was a worm targeted at industrial plants). The arrival of the WannaCry attack, however, combines a computer worm with ransomware to create anÃâà...
Security Intelligence (blog)
April 25, 2017
In 2010, a new kind of computer worm was discovered. At the time, it took advantage of a then-unknown flaw in the Windows shell present in every supported version of Windows. This included Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7. The flawÃâà...
CSO Online
April 19, 2017
Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so. The worm, known as Hajime, has infected tens of thousands of easy-to-hack products such as DVRs, internet cameras, and routers. However, theÃâà...
|
news and opinion
|