News

Computer security technologists are racing to find ways to block ever-more complex computer worms and viruses that burrow into computers -- usually via e-mail -- and wreak havoc on network systems.
In this article, we will lay out the key differences between a computer worm and a virus.
Around the world this week, digital worms have been invading computers at hundreds of thousands of offices and homes. NPR's Chris Arnold reports on the latest attack of computer worms. Get tips on ...
Internet security experts are divided on the source and purpose of computer viruses and worms like Blaster and SoBig. But some government agencies are investigating a possible connection between ...
Certain types of attacks combine attributes of viruses, worms, and Trojans into "blended threats" that may spread more effectively and be harder to defend against.
By applying anomaly algorithms best suited to the attacks they are designed to detect, anomaly detection can proactively identify zero-day worms, malware, acceptable-use policy violations and ...
This being the 40th anniversary of the Internet, Symantec, the manufacturer of computer-security software, has published a list of the top computer worms, viruses, trojan horses, and hoaxes in ...
With Vince Tuesday away, the security team whips into action when it encounters suspicious port scans and connection attempts. But the culprit turns out not to be some new and sinister virus ...