![]() Worms might also be able to infect any device that connects to that computer automatically. Some are programmed to automatically infect any computer on the same local network. Less commonly, worms can be installed if you visit a compromised website and click a link that activates the worm.Īfter the worm has been installed on your computer, it goes to work making copies of itself. A worm can be embedded in a compromised email attachment or link within the message and often comes as part of a phishing scheme, where the infected file is masquerading as something legitimate, like a document or spreadsheet. The primary vectors of infection are email and websites. ![]() Like any malware, a computer worm requires a human being to initiate the infection. ![]() It's similar to a virus, but a worm is somewhat more sophisticated, able to proliferate without any human intervention. Malware that, once it has infected a computer, continues to replicate itself on the infected computer as well as automatically infecting other computers it comes in contact with.
0 Comments
Leave a Reply. |