Let’s talk about COMPUTER WORMS!

Let’s talk about COMPUTER WORMS!

Hi there!?

Bolatito is here again with more cybersecurity tips and info to keep you cyber safe ???

Do you know that worms are not only physical, but they also exist as malware that can damage your devices? Before we dive deeper into worms, click here to read about Trojans from my last letter. Done with that? Let’s get to the fresh gist.?

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program to cause damage. Worms can wreak a lot of havoc on an infected device such as modifying and deleting files, stealing data, installing a backdoor, allowing cybercriminals to gain control of a device or network etc.?

How do computer worms work??

Worms can be transmitted via software vulnerabilities or as attachments in spam emails or instant messages. Once opened, these files could provide a link to a malicious website or automatically download the computer worm. Once it’s installed, the worm silently goes to work and infects the rest of the machine without the user’s knowledge.?

Worms can modify and delete files, and they can even inject additional malicious software onto a computer. Sometimes a computer worm’s purpose is only to make copies of itself over and over — depleting system resources, such as hard drive space or bandwidth, by overloading a shared network. In addition to wreaking havoc on a computer’s resources, worms can also steal data, install a backdoor, and allow a hacker to gain control over a computer and its system settings.?

So, you may ask, how does one keep themselves protected from these worms? I got you. It is malware, and we should treat it as such.?

  • Ensure your devices and applications are up to date with the latest software. Install these updates as soon as they’re available because updates often include patches for security flaws.?
  • Always be extra cautious when opening unsolicited emails, especially those from unknown senders that contain attachments or dubious links. Phishing is another popular way for hackers to spread worms (and other types of malware).?
  • Invest in a strong internet security software solution that can help block these threats and malware.?
  • Worms can be stopped with the use of the right antivirus and anti-malware software, also through safe computing practices. If you suspect your devices are infected with a computer worm, run a virus scan immediately.?
  • Monitor speed and performance. Has your computer seemed a little sluggish lately? Are some of your programs crashing or not running properly? That could be a red flag that a worm is eating up your processing power.?

Side Gists?

It’s almost here!! Our first edition of the CyberSafe Hiring Summit happening in October. During the hiring summit organizations and recruiters from across the world will be given the opportunity to interview and hire entry-level cybersecurity professionals from the CyberGirls Fellowship and Enugu Cyber Security Learning (ECSL). Are a recruiter/organisation interested in attending the summit? Fill out the registration form here or send a mail to [email protected] for enquiries.?

No alt text provided for this image

Have you ever been a victim of a non-delivery scam? Where you pay for stuff, but it never came, or the service was never received? Our NoGoFallMaga team put this piece together to help all of us avoid falling (or falling again) into such scams. Click here to read.?

It is always fun writing to you, and I look forward to doing it again next time as we discuss the Antivirus.?

Till then, stay cyber-safe.????

Yours truly,?

Bolatito?

Temitope Akintunde

Data Scientist | Machine Learning | Data Analyst | Python | Tableau | SQL | PowerBI|Azure|ITIL4 Foundation | Application Analyst

2 年

Thank you for sharing

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了