Security Stronghold threat catalog
Worm | Rat | Trojan | Malware | Adware | Virus | Hijacker | Parasite | Badware | Keylogger | Spyware | Downloader | Dialer | Toolbars | Pop-ups | Ransomware | Rogue Software | Cookies
Threats type: Worm
W32.Welchia
W32.Xabot.Worm W32/Bagle.CK W32/IRCBot-N W32/Lovgate-AD W32/Mapson-A W32/Randon-O W32/Sddrop-B WaterWorks WebSpeed Win32-Tenga Win32.Aibatook Win32.Bagle.B Win32.Bagle.E Win32.Bagle.G Win32.Bagle.H.ref Win32.Bagz.D Win32.Brontok Win32.Bundpil Win32.Generic.Worm Win32.Hacktool.Brontok Win32.Hacktool.Craagle Win32.HLLW.Nebiwo Win32.Kuluoz Win32.Netsky.D Win32.Nuqel.BD Win32.P2P-Worm.Alcan.a Win32.Padobot Win32.Sasser Win32.Sndc.A It is a distinctive feature of worms to copy themselves from one points to other ones many times in a row. Worms spread themselves automatically over user’s e-mail address book. One worm can multiply itself many times. Hereby your computer becomes a worm carrier if you want it or not. Even if your reputation is indifferent for you don’t forget that worm grabs a lot of your system resources. Worm attacks such as the much-talked-about Blaster Worm recently are usually designed to tunnel into your Windows and give an access to malicious users to control your computer remotely. A spread of the worm is like an avalanche. To stop worm’s distribution you may take advantage of our products. Stronghold AntiMalware can successfully detect and remove latest worms due to it's Hybrid Cloud technology. ... [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] Security Stronghold threat catalog: 313, current: 241 — 270 |
Copyright © 2024 Security Stronghold. All Rights Reserved. All content on this website is protected and belongs to Security Stronghold LLC.