Schema-Root.org logo

 

  cross-referenced news and research resources about

 Nimda computer worm

Schema-Root.org logo
images:  google   yahoo YouTube
spacer

updated Tue. February 20, 2024

-
This kind of self-defeating behavior will be familiar to those who recall the original Morris Worm, NIMDA, CODE RED, Welchia, Blaster and SQL Slammer disruptions of yesteryear.

... must become the wake-up call for the hardware industry, the way that the Code Red and Nimda worms were for the software industry 15 years ago," said Michael Sutton, CISO at cloud security company Zscaler, in comments emailed to SCMagazine.
From the the early days of computer security, naming schemes for viruses and worms have been all over the map, from researchers' beverage choices to messages contained within the actual code.
From the the early days of computer security, naming schemes for viruses and worms have been all over the map, from researchers' beverage choices to messages contained within the actual code.
Fifteen years ago, there were two worms, Code Red and Nimda. Those are still out there. People at home who own those machines don't know it and don't know they have to clean it up.
X was developed independently to secure enterprise endpoint devices by combining deep learning with behavioral monitoring in one lightweight agent.
It was not long before the first piece of malicious software or malware made an appearance, with the detection in 1971 on the Arpanet of the Creeper worm, an experimental and relatively harmless self-replicating piece of software that used the Arpanet ...


 

news and opinion


 


 


 


 


schema-root.org

   internet
    security
     malware
      worms
        nimda

software worms:
        blaster
        conficker
        kido
        memory‑stick
        netsky
        nimda
        sasser
        smb worms
        storm
        stuxnet
        waledac