When we hear the term computer worm, it is sometimes classified to a virus. Though sharing similar traits, they are completely different in their mode of infection and operation.
A computer virus usually gains entry through a file or attachment. Once inside, they need to be activated by the user. This is done by opening the infected file or executing it.
A worm, though mode of entry is the same, does not require user assistance. They infect and replicate completely autonomous.
Mode of Entry
- File sharing: Disguised as non-suspicious media files, they spread through sharing sites like Torrent.
- Social media: Appears as interesting links, they prompt the user to click and download.
- Phishing: Spreads via email attachments, usually from a contact whose system has been infected.
- Zero-day exploits: Sometimes the operating system has some bugs or security weakness which gets compromised.
- External devices: Infected portable hard disc or USB drive
Symptoms
- Low internet speed.
- Computer becomes slow and sluggish.
- Files gets corrupt or missing.
- Firewall starts giving repeated alerts.
Prevention
- Make sure firewall is always on and active. Do not disable without prior reasons.
- Invest in a paid antivirus software like Norton or McAfee.
- If a file or email attachment appears suspicious, do not download. This is true even from trusted contacts.
Additional information
Comments
Post a Comment