WhatIs definition: Robert Morris worm

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Antimalware technologies and techniques to the rescue

    Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love to break into top-level enterprise systems, but now they're also aiming low, taking advantage of the... 

  • Cyberthreats: Know thy enemy

    The complexity of emerging technologies and trends such as BYOD has security teams operating at full speed, and there's no sign of slowing down. In our inaugural issue of 2014, we look at the top cyberthreats that security professionals are likely to... 

  • Help! Evaluating AV solutions and tech support

    We tested AV solutions from 5 vendors and their tech support. Find out who answered the call. Also in this issue, read features on spyware threats, prosecuting hackers and self-defending networks. 

  • Weight lifter: Appliances that lighten your security load

    "All-in-one" security appliances offering similar features can be surprisingly different under the hood. To better understand the capabilities of these security gateways, Information Security compared six appliances designed for midsized compa... 

  • Comeback kid: Sanjay Kumar on Computer Associates' security strategy

    After a tumultuous several years, Sanjay Kumar believes Computer Associates' security strategy will be what leads the company back to the top. Also in this issue: Ed Skoudis examines the proliferation of combo malware and why the worst may be yet to ... 

  • equipment destruction attack

    An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment. Equipment destruction attacks can be enabled simply as a result of physical access to the computer ... 

  • domain generation algorithm (DGA)

    A domain generation algorithm or DGA is a computer program used to create domain names, typically for the purpose of propagating remotely controlled Web-based malware. 

  • pre-installed malware

    Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware. 

  • peer-to-peer botnet (P2P botnet)

    A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.  Just as in the traditional botnet, which includes a command-and-control server, the bots are t... 

  • botnet topology

    A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication. 

  • command-and-control server (C&C server)

    A command and control server (C&C server) is the centralized computer that issues commands to a botnet (zombie army) and receives reports back from coopted computers. In the traditional botnet, which includes a C&C server, the bots (or zombies) are t... 

  • Robert Morris worm

    The Robert Morris worm is widely acknowledged as the first computer worm to be distributed across the Internet and the first computer virus to receive mainstream media attention. 

  • zero-day vulnerability

    A zero-day vulnerability is a flaw in software, hardware or firmware that is exploited as soon as or before it becomes generally known to the public. 

  • Kaptoxa

    Kaptoxa (pronounced kar-toe-sha) is a type of point-of-sale (POS) malware designed to compromise payment information systems. 

  • micro VM (micro virtual machine)

    A micro VM (micro virtual machine) is a virtual machine program that serves to isolate an untrusted computing operation from a computer's host operating system. 

  • See more Definitions on Malware, Viruses, Trojans and Spyware
About Malware, Viruses, Trojans and Spyware

Get tips and tricks on how to remove and detect malware, viruses, worms, Trojan, rootkits, spyware and adware. Experts also offer advice detection and prevention software, including antivirus and antispam.