Computer security technologists are racing to find ways to block ever-more complex computer worms and viruses that burrow into computers -- usually via e-mail -- and wreak havoc on network systems.
The Federal Bureau of Investigations (FBI) and the Internet Crime Complaint Center (IC3), have received reports of recent spam e-mails spreading the Storm Worm malicious software, known as malware.
The sophisticated Nimda worm virus that plagued computers around the globe last week did not spare the Tufts network. The virus snaked its way across campus computers primarily through the popular ...
our ability to protect the Net. the heart of the Internet were affected Saturday by what experts are calling the worst worm since Code Red in 2001. A worm that attacks Microsoft's database software ...
The worm _ called "Mydoom,' "Novarg' or "WORM_MIMAIL.R' _ was replicating itself so quickly that some corporate networks were clogged with infected traffic within hours of its appearance Monday. Its ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. The first sign of computer worm activity dates back to ...
A computer scientist at Washington University in St. Louis has developed technology to stop malicious software – malware – such as viruses and worms long before it even has a chance to reach computers ...
A so-called proof-of-concept worm started spreading over the weekend among the PCs of people using the peer-to-peer file-swapping protocol known as Gnutella. The computer worm was likely created to ...
Computer worms have tried all sorts of ploys for tricking users into activating them, but the latest is particularly sneaky--it masquerades as a virus warning from Symantec, a well-known anti-virus ...
A Russian antivirus company apologized Friday for an e-mailed virus alert that was infected with the very worm the message was supposedly designed to warn against. Kaspersky Labs said the message, ...
2003-09-11T00:10:29-04:00https://images.c-span.org/defaults/Capitol_default-image.jpgIn a continuing examination of cyber security issues, the subcommittee heard ...