Here are some other proactive ways to mitigate computer worms. File-sharing worms disguise themselves as media files with dual extensions and once the victim opens the downloaded file, the worm is downloaded to their computer as well.īy scanning your device, these tools can detect the hidden location of the worm inside your computer and also remove them. File-Sharing Wormsįile-sharing or peer-to-peer file transfers can be illegal but are still used by many people to download media files. Masked as legit attachments or clickable links to websites, they mostly display short messages like "LOL" or "You need to see this!" to fool the victims into believing that it is sent by friends or family members. Similar to email worms, instant messaging worms are spread through links sent to the contact lists of instant messaging applications. Once the victim clicks on the attachment, copies of that infected file are sent automatically to all the addresses listed in the contact list. avi.exe), fooling the recipient into thinking that they are media files. Email worms make their way into a victim's computer through infected email messages or attachments. These attachments mostly have double extensions (for example.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |