computer worms
-
New discovery of the first version of Stuxnet malicious code
on the afternoon of february 27, 2013, symantec announced in vietnam the new version of the stuxnet malware version, and said that the stuxnet project could be launched in 2005 instead of 2009 as announced. before.
-
Warning virus similar to Stuxnet 'computer worm'
on october 18, us provider of security services symantec warned of a dangerous new computer virus like stuxnet 'computer worm'.
-
Stunned because the 'worm' spread via email
symantec's security response department has warned of a new worm w32.imsolk.b@mm that is spreading through e-mail at a dizzying speed, attacking hundreds of thousands of computers around the world.
-
Information from Symantec about Hydraq trojan worms
the trojan.hydraq worm was used to exploit the zero-day vulnerability in internet explorer, reports from symantec.
-
Deeper computer fakes 'more famous'
thanks to mimicking some of conficker's infection strategies, the little known worm of neeris over the weekend caused a surprise.
-
The new worm 'digs' a Windows vulnerability
a new worm with the name win32 / conficker.a is spreading quite strongly in the network of computers that install windows operating systems
-
Cyber-Attack attacked the US military network
after the us army strategic command issued a ban on the use of mobile communications devices in the us military network last week ...
-
EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.
-
SV joins the top 10 global threats
remote access trojan (rat) named flawedammyy recently joined the top 10 global threat index list.
-
Windows computer worm forces users to view Homestar Runner
w32 / lacon-a is a computer virus that has been around since the mid-2000s. at that time, it was very classic with spam like email, registry or cameo homestar runner.