Skip to main content

Questions tagged [worm]

Use this tag in relation to any kind of computer program that can replicate itself on its own, without user intervention, Like the old Morris worm. Lately, SMB vulnerabilities are the most common method.

0 votes
0 answers
116 views

Maybe I'm overly cautious here, but I bought a 2nd hand IKEA Tradfri lightbulb. The package was opened so whoever owned it before had access to the bulb itself. My question is: Am I too cautious ...
Xenonite's user avatar
1 vote
1 answer
201 views

The company I work at sadly fell victim to BlackByte NT ransomware this week. It ransomed many of the Windows machines on our factory floor. I have used my personal laptop (Windows 10 Home, version ...
Intrastellar Explorer's user avatar
0 votes
1 answer
115 views

Academic literature describes a method for distributing benevolent patches "in which every newly patched node forwards the patches to some or all of its neighbors according to a well-designed ...
charmoniumQ's user avatar
0 votes
0 answers
165 views

Is it possible to have infected Computer A infect Computer B whilst being only connected by an Ethernet cable? My current research into worms is that they always seem to require an additional vector ...
The Radiant's user avatar
2 votes
2 answers
3k views

Is there malware that can run from a simple download from the internet autonomously without user interaction/initiation? I know there are worms that can do that, but I assumed they needed to be opened ...
Rhodium0092's user avatar
1 vote
0 answers
162 views

I wonder if this is the right place to ask about the specific functioning of viruses / worms. We all receive fishy mails all the time. And generally I never click on anything, especially not ...
Gunther Schadow's user avatar
0 votes
1 answer
244 views

I was able to successfully compile the blaster worm source code. I have its executable file now but I'm not sure if it is safe to run this file on my Windows 10 computer or not. What might happen if I ...
The Rizzler's user avatar
0 votes
1 answer
341 views

I know that it's theoretically possible that a router can be hacked, and malware can be spread throughout a network merely by being connected to it. However, I'm wondering what exactly the chances of ...
aslingaboutsec's user avatar
0 votes
1 answer
449 views

Suppose malware lands and executes on a computer. Could this malware attempt to spread further by writing itself to data files (images, pdfs, docs) and hoping that the owner would transfer or upload ...
aleks1265's user avatar
0 votes
1 answer
145 views

I'm writing a sci-fi story that includes a malicious app that spreads globally. The developer publishes an app without knowing it's infected, and it spreads because it forces phones to download it. ...
Jori Richman's user avatar
2 votes
0 answers
198 views

I want to know the status of remote, code executing vulnerabilities of old Windows operating systems that are left unfixed, if they exist at all. Exploits like EternalBlue or BlueKeep wreaked havoc on ...
manatails's user avatar
4 votes
0 answers
224 views

From what I can tell there were two main TMP files present on the infected USB stick. The smaller of the two would run first and hook various functions related to viewing files so as to hide the LNK ...
user avatar
0 votes
1 answer
616 views

5 days ago, I downloaded a file from the internet and I'm currently worried about it being malware. I don't store any important information on the computer I downloaded it with, but I'm afraid of the ...
DaddyMike's user avatar
19 votes
3 answers
6k views

Here is the conundrum: At my current company, we process physical discs from numerous third party sources and extract the data from them to ingest to our own system. While we can generally trust the ...
Sera H's user avatar
  • 291
-5 votes
1 answer
516 views

NOTE: I am New contributor, if the question needs some improvement please tell in comment before down voting! Usually I see messages on whatsapp and sometime on some other forums stating that forward ...
Ajwad Syed's user avatar

15 30 50 per page