Security Stronghold threat catalog
Worm | Rat | Trojan | Malware | Adware | Virus | Hijacker | Parasite | Badware | Keylogger | Spyware | Downloader | Dialer | Toolbars | Pop-ups | Ransomware | Rogue Software | Cookies
Threats type: Worm
Win32.SurNova.Worm
Win32.Swen.A Win32.Torvil Win32.Turta.A Win32.Worm.Tibick Win32.Worm.Viking Win32.Worm.Warezov Win32.Worm.Zhelatin Win32/Dorkbot Win32/Honditost.A Win32/Taterf.B Worm.Antimane Worm.Chupik Worm.Copali Worm.Esjey Worm.Gamarue Worm.Gamarue.A Worm.Kolabc Worm.Lightmoon.H Worm.Ludbaruma Worm.Mira Worm.Mocmex Worm.Murkados Worm.Ngrbot Worm.P2P.SdDrop.c Worm.Pluto Worm.RunOnce Worm.RussoTuristo Worm.Win32.Colowned Worm.Win32.Ircobus It is a distinctive feature of worms to copy themselves from one points to other ones many times in a row. Worms spread themselves automatically over user’s e-mail address book. One worm can multiply itself many times. Hereby your computer becomes a worm carrier if you want it or not. Even if your reputation is indifferent for you don’t forget that worm grabs a lot of your system resources. Worm attacks such as the much-talked-about Blaster Worm recently are usually designed to tunnel into your Windows and give an access to malicious users to control your computer remotely. A spread of the worm is like an avalanche. To stop worm’s distribution you may take advantage of our products. Stronghold AntiMalware can successfully detect and remove latest worms due to it's Hybrid Cloud technology. ... [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] Security Stronghold threat catalog: 313, current: 271 — 300 |
Copyright © 2024 Security Stronghold. All Rights Reserved. All content on this website is protected and belongs to Security Stronghold LLC.