Skip to main content

Posts

Showing posts from March, 2025

Computer Worm - I Eat and Infect

  When we hear the term computer worm, it is sometimes classified to a virus. Though sharing similar traits, they are completely different in their mode of infection and operation. A computer virus usually gains entry through a file or attachment. Once inside, they need to be activated by the user. This is done by opening the infected file or executing it. A worm, though mode of entry is the same, does not require user assistance. They infect and replicate completely autonomous. Mode of Entry File sharing : Disguised as non-suspicious media files, they spread through sharing sites like Torrent. Social media : Appears as interesting links, they prompt the user to click and download. Phishing : Spreads via email attachments, usually from a contact whose system has been infected. Zero-day exploits : Sometimes the operating system has some bugs or security weakness which gets compromised. External devices : Infected portable hard disc or USB drive       Symptoms Low...