Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

worm

Panda Burning Incense worm due for a comeback

by Shanmuga

"A computer worm that China warned Internet users against is an updated version of the Panda Burning Incense virus, which infected millions of PCs in the country three years ago, according to McAfee. The original Panda worm, also known as Fujacks, caused widespread damage at a time when public knowledge about online security was low,

Read the full article →

25 years of the computer virus

by Shanmuga

"A stressed e-mail from a friend once read: "A worm has just eaten my kid!" Thankfully, the message was not referring to infanticidal earthworms, but rather to a type of computer virus, a "worm", that had just infected some files (known as KID files) on his computer.

Read the full article →

Malware: Mobile worm spreads through networks

by Shanmuga

"Experts are warning of a new worm spreading across mobile networks via Symbian phones. The worm is similar to the CommWarrior mobile virus, and initially fooled researchers into believing that it was not new. However, it is actually a new class of mobile virus which spreads via file extensions named ‘beauty.jpg’, ‘sex.mp3′ and ‘love.rm’.

Read the full article →

Vulnerabilities: Microsoft Flaw could lead to worm attack

by Shanmuga

"Microsoft has fixed a critical flaw in the Windows operating system that could be used by criminals to create a self-copying computer worm attack. The software vendor released its first set of patches for 2008 on Tuesday, fixing a pair of networking flaws in the Windows kernel. Microsoft also released a second update for a

Read the full article →

Malware: How Antivirus Programs (Don’t) Work

by Shanmuga

"For over 25 years, the computer community has been dealing with malicious software. These little pieces of malware started as minor pranks and theoretical explorations into subverting security controls, but soon developed into more malicious programs that have left a significant impact on the computing community. Over the last decade we have seen viruses/Trojans/worms wreck

Read the full article →