• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Trend Spotlight   »   What Are Computer Worms and How Can I Protect Myself From Them?

What Are Computer Worms and How Can I Protect Myself From Them?

  • Posted on:November 14, 2012
  • Posted in:Trend Spotlight
  • Posted by:
    Trend Micro
1

By Vic Hargrave

Computer worms are a form of malware that have the capability to rapidly infect many computers on a network by sending copies of themselves from one system to another over network connections.

The Melissa worm in 1999, Sobig worms in 2003 and MyDoom worm in 2004 all propagated through email in the form of attachments. The emails enticed users to open the attachments, which then installed the worms on the target systems. MyDoom was also able to spread itself though a peer-to-peer file sharingĀ program known as KaZaA. Other worms have found their way into networks through network services such as database or web servers. But wait, there's more!

More recently worms have started showing up in social media forums.Ā  Trend Micro’s Malware Labs recently discovered a worm that propagates through private IM messages on Facebook.

Once installed, worms can do all sorts of damage like setting up Trojans that can be used to control your computer system to steal personal information or attack other systems as part of a botnet – a collection of computers that have been hacked to work together to attack other computer systems under the control of an external botnet master system.

How to Protect Yourself From Worms

It can be difficult to get rid of malware like viruses, Trojans, and worms once they infect a system, so it’s always best to prevent them from getting onto your computer in the first place.

Use a personal firewall to block external access to network services.Ā  It’s easy to forget about this part of your protection, but it is very important.Ā  Without a firewall your computer system is fully exposed to attack on the Internet, particularly when you are using public Wi-Fi systems at cafes and your local library.

You should use care when clicking on links in social media and email messages.Ā  If you don’t’ know where the messages came from or you do know but don’t trust the senders, then don’t click on the links.Ā  Of course it’s easy to make a mistake in this regard so you should have good anti-malware protection installed on your computer.

Trend Micro’sĀ Smart Protection Network™ provides comprehensive protection against worms, viruses, and Trojans. For example, SPN detects the aforementioned Facebook worm is detected as WORM_STEKT.EVL. You can get advanced SPN protection with Trend Microā„¢ Titaniumā„¢ Maximum Security for Windows and Trend Microā„¢ Titanium™ Internet Security for Mac.

I work for Trend Micro and the opinions expressed here are my own.

For more tips and advice regarding Internet and mobile security, just ā€œLikeā€ Trend Micro Fearless Web Internet Security on Facebook atĀ http://www.facebook.com/fearlessweb.

 

Related posts:

  1. Malicious worm exploits Skype API to target Windows users
  2. How to Protect Your Computer from Malware
  3. How to Protect Your Computer from Malware
  4. Viruses, Spyware and Worms, oh my!

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.