Worms

A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer. Many worms that have been created are only designed to spread, and don’t attempt to alter the systems they pass through. A “payload”, however, is code designed to do more than spread the worm it might delete files on a host system, encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a zombie (an Internet accessible computer compromised by a hacker) under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website’s address.

How Can You Detect Worms?

Download SpyHunter’s Detection Scanner
to Detect Worms.
* SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are 768 articles listed on worms.

Name Threat Level Detection Count Date
‘U.Z.A. Operating System’ Wallpaper November 17, 2011
ACAD/Medre.A 55/10 75 June 22, 2012
ALS.Kenilfe!inf February 28, 2011
Artemis!DD51CDCC10D0 June 8, 2010
Autoit.Obfus 99/10 113 September 23, 2009
AutoIt/Renocide 55/10 43 December 3, 2010
AutoRun.AEC 99/10 11 January 15, 2010
Av.exe March 9, 2010
Backdoor.Poebot.AL 88/10 11 November 26, 2010
Backdoor.SpyBoter December 9, 2009
BD.Raptra December 2, 2009
Bizex January 9, 2012
Blackout December 29, 2010
Bloodhound.W32.1 99/10 250 December 8, 2009
Bofra.A 99/10 78 May 13, 2009
BOO/Whistler.A 55/10 9 October 31, 2011
BrowserModifier.SearchV 22/10 64 January 7, 2010
Conficker 99/10 38 January 24, 2014
Conficker A/B May 31, 2010
Conficker B++ 55/10 671 July 10, 2009
Conficker.C 55/10 72 June 24, 2009
Conficker.e May 21, 2009
Corrupt-EP July 28, 2010
Cridex-B February 7, 2012
DMSetUp May 13, 2009

1 2 3 4 5 6 7 8 9 10 11 31
Search by Letter: A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  
Home | SpyHunter Risk Assessment Model | Privacy Policy | EULA | Additional Terms and Conditions
Copyright 2003-2017. Enigma Software Group USA, LLC. All Rights Reserved.