Return to site

What is a computer virus or worm

broken image

Microsoft Outlook is very susceptible against ILOVEYOU. In the majority of the cases, the ILOVEYOU worm spreads from one device to another through emails. From there, the worm continues to replicate, spy, consume HDD space and communicate with the hacker’s headquarters operation. Once the user clicks on them, the malicious worm gains entry into the device. Hackers usually hide malicious executable files in JPEG images. Vulnerable chatting services include Facebook Messenger, which is a famous hotspot for hackers since the platform has over 1 billion monthly users worldwide. Messaging apps are another channel for computer worm contamination. Hackers can now find those flaws more easily and inject malicious lines of code into legitimate-looking apps. Almost all operating systems on the mobile platform have HTML5 security flaws.

broken image

The primary method of contamination on mobile devices is HTML5-based apps. Hackers who develop worms now focus on mobile platforms and devices more than any other type of platform.

Around 6.5 billion people own smartphone devices, which is the primary medium through which computer worms spread. Computer worms spread so quickly today because of how interconnected the digital ecosystem has become.

broken image