PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
September 2017, Vol. 19, No. 7

Why WannaCry and other computer worms may inherit the earth

Using a self-replicating computer program to deliver malware on a target network is an old trick. Like most things on the internet, computer worms come from an innocent enough past. Over time, the use of worms moved down a predictable path, from computer-savvy engineers who were experimenting to the criminal realm to the rise of nation-sponsored cyberespionage groups. Why should this matter to CISOs? As global cyberattacks have exploded in recent months, computer worms are causing collateral damage, not only to nation-states, but to corporate valuations and financial performance. In June, FedEx warned that the Petya cyberattack, which disrupted operations at its TNT Express subsidiary, may have "material impact" on the company's 2017 financial performance. Merck & Co. Inc., another victim of the June attack, issued a similar warning. A computer worm is similar to a computer virus, but it has distinct characteristics. Unlike spear-phishing emails, worms do not require a delivery system; instead, they attack the ports and ...

Features in this issue

Columns in this issue

Networking
CIO
Enterprise Desktop
  • Understanding how GPOs and Intune interact

    Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to...

  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to install MSIX and msixbundle

    IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an ...

Cloud Computing
ComputerWeekly.com
Close