Unlike viruses, worms do not require a host program to survive and replicate.

While every effort has been made to follow citation style rules, there may be some discrepancies. Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

Copy Citation

Share

Share

Share to social media

Facebook Twitter

URL

https://www.britannica.com/technology/computer-worm

Give Feedback

External Websites

Feedback

Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).

Feedback Type

Your Feedback Submit Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

  • Clemson School of Computing - Computer Worms

Print Cite

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies. Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

Copy Citation

Share

Share

Share to social media

Facebook Twitter

URL

https://www.britannica.com/technology/computer-worm

Feedback

External Websites

Feedback

Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).

Feedback Type

Your Feedback Submit Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

  • Clemson School of Computing - Computer Worms

By The Editors of Encyclopaedia Britannica

Table of Contents

Related Topics:cybercrime malware Stuxnet zombie computer antivirus software...(Show more)

See all related content →

computer worm, computer program designed to furtively copy itself into other computers. Unlike a computer virus, which “infects” other programs in order to transmit itself to still more programs, worms are generally independent programs and need no “host.” In fact, worms typically need no human action to replicate across networks.

On November 2, 1988, a computer science student at Cornell University named Robert Morris released the first worm onto the Internet from the Massachusetts Institute of Technology. (As a guest on the campus, he hoped to remain anonymous.) The worm was an experimental self-propagating and replicating computer program that took advantage of flaws in certain e-mail protocols. Because of a mistake in its programming, rather than just sending copies of itself to other computers, this software kept replicating itself on each infected system, filling all the available computer memory. Before a fix was found, the worm had brought some 6,000 computers (one-tenth of the Internet) to a halt. Although Morris’s worm cost time and millions of dollars to fix, the event had few commercial consequences, for the Internet had not yet become a fixture of economic affairs (see e-commerce). That Morris’s father was the head of computer security for the U.S. National Security Agency led the press to treat the event more as a high-tech Oedipal drama than as a foreshadowing of things to come.

Britannica Quiz

Computers and Technology Quiz

Whereas the next few worm outbreaks were typically pranks and relatively benign, cybercriminals began using them to create zombie computers, linked by the millions in botnets, that were activated to send out spam, often for hire, or to flood Web sites with denial-of-service attacks, often involving blackmail schemes.

We want to help our customers better protect themselves against potential Internet threats. By familiarising yourself with current threats and past trends, you can increase of your chances of effectively combating the evolving tactics.

The most recent banking security threats are listed below:

Phishing

Phishing is a scam where hackers 'fish' for your personal details by using emails claiming to be from financial institutions. This method continues to be favoured by online thieves.

Emails claiming to be from banks or other legitimate institutions are sent in bulk. The email asks the recipient to provide sensitive information such as their username, password, User ID or PIN by providing a link leading to an authentic-looking website, enabling thieves to gather the details for later fraudulent use.

An example of a hoax email is shown below:

Unlike viruses, worms do not require a host program to survive and replicate.

If you receive an email requesting you to re-register or re-enter sensitive details, delete it immediately and notify the ANZ Internet Banking Support Centre in your country.

You can minimise your chances of being a victim of phishing scams by:

  • never accessing Internet Banking by clicking a link found in an email
  • treating all emails requesting personal log on information such as username, password or PIN with extreme caution. Authentic ANZ emails will not request personal details or log on information 
  • immediately deleting emails of unknown origins, no matter how innocent or provocative the subject headings sound
  • changing your Internet Banking password on a regular basis
  • keeping your anti-virus and firewalls up-to-date and perform regular scans of your computer.

Spyware is a type of software that secretly collects user information while on the Internet.

Adware is a type of spyware used by marketers to track Internet users’ habits and interests for the purpose of customising future advertising material. Adware can monitor information such as the types of sites visited, types of articles read, or the types of pop-ups and banners the user clicks on. The information is then used to customise future advertisements directed to the user, or can be sold to a third party for the same purpose.

There are products available that can help you detect, monitor and remove spyware from your computer. Many complete computer security software suites now come standard with a spyware detection and removal feature.

You can minimise your chances of unintentionally downloading spyware onto your computer by:

  • being wary of banners, ads and pop-ups while surfing the Internet. Do not click on them no matter how enticing they may appear
  • reviewing terms and conditions when you install free programs or subscribe to services from the Internet
  • using up-to-date anti-spyware program to regularly scan your computer.

A computer virus is software that attaches itself to another program. Similar to a biological virus, it must attach itself to another live program to survive and reproduce. Unlike , which are self-sufficient programs, viruses can only run if the infected program is running. While active, the virus attempts to reproduce and attach itself to other programs. This can tie up resources such as disk space and memory, causing problems on any computer.

An email virus is the latest type of computer virus. It is transported through email messages and usually replicates by automatically distributing itself out to all contacts on the victim’s email address book.

A worm is similar to a virus. It exploits computers in a network that contain security holes. Once a security hole is found, the worm will attempt to replicate itself from computer to computer. Like viruses, worms can be equally destructive.

You can increase your chances of ensuring your computer is free from worms and viruses by:

  • installing anti-virus software and keeping it updated
  • downloading and installing security patches for your operating system as soon as they become available
  • not accepting attachments from emails of unknown sources
  • installing software from trusted sources only.

A trojan is a destructive program that poses as a harmless application. Unlike , trojans do not replicate themselves and do not need a host program to attach to.

Today’s computer users often accept trojans onto their computers, believing that the program is harmless or even helpful. Some trojans will claim to rid the computer of viruses or other harmful applications, but instead introduce viruses and leave it vulnerable to attacks by hackers.

What is the difference between a virus and a worm quizlet?

The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, in order to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

What's the difference between a virus and a worm quizlet coursera?

What is the main difference between a worm and a virus? A worm requires an execution mechanism to start, while a virus can start itself. A worm tries to gather information, while a virus tries to destroy data. A worm can replicate itself, while a virus requires a host for distribution.

Does a worm require human interaction to spread to other computers?

How do computer worms spread? While some computer worms require user action to initially propagate, such as clicking on a link, others can easily spread without user interaction. All that's necessary is for the computer worm to become active on an infected system.

Which type of malware is a self

A Worm is a self-replicating program. It is self-contained and does not require a host program. The program creates the copy and causes it to execute; no user intervention is required. Worms commonly utilize network services to propagate to other computer systems [19].