updated Sun. September 15, 2024
-
Krebs on Security
January 18, 2017
This kind of self-defeating behavior will be familiar to those who recall the original Morris Worm, NIMDA, CODE RED, Welchia, Blaster and SQL Slammer disruptions of yesteryear.
SC Magazine
October 25, 2016
... must become the wake-up call for the hardware industry, the way that the Code Red and Nimda worms were for the software industry 15 years ago," said Michael Sutton, CISO at cloud security company Zscaler, in comments emailed to SCMagazine.
The Parallax (blog)
October 14, 2016
From the the early days of computer security, naming schemes for viruses and worms have been all over the map, from researchers' beverage choices to messages contained within the actual code.
The Parallax (blog)
October 14, 2016
From the the early days of computer security, naming schemes for viruses and worms have been all over the map, from researchers' beverage choices to messages contained within the actual code.
OpenGov Asia (blog)
September 23, 2016
Fifteen years ago, there were two worms, Code Red and Nimda. Those are still out there. People at home who own those machines don't know it and don't know they have to clean it up.
eWeek
May 16, 2016
X was developed independently to secure enterprise endpoint devices by combining deep learning with behavioral monitoring in one lightweight agent.
ComputerWeekly.com
March 31, 2016
It was not long before the first piece of malicious software or malware made an appearance, with the detection in 1971 on the Arpanet of the Creeper worm, an experimental and relatively harmless self-replicating piece of software that used the Arpanet ...
|
news and opinion
|