short for: write once, read many, a.k.a. wormable

Known as a virus, it is a computer program that can replicate itself. If something is "wormable" it could spread rapidly like a ransomware attack.

Historical perspective: First postulated by computer science researcher Fred Cohen in the 1970's, computer viruses are small programs that propagate by attaching copies of themselves to other programs. The most famous examples include the 1987 "Internet worm," which shut down hundreds of computers nationwide, and the July 2001 "Code Red worm." The word "worm" is sometimes erroneously used for a search engine program that locates and indexes information on the Web (that's a spider).

On March 5, 2009 Brian Krebs reported on his Computer Security blog in the Washington Post that security experts are warning users of Facebook, MySpace and other social networking communities to be on guard against a new strain of the "Koobface" worm, which spreads by tricking users into responding to a message apparently sent from one of their friends. The latest version of Koobface arrives as an invitation from a user's friend or contact, inviting the recipient to click on a link and view a video at a counterfeit YouTube site. Visitors are told they need need to install an Adobe Flash plug-in to view the video. The bogus plug-in instead installs a Trojan horse program that gives Koobface authors control over the infected user's computer, according to security firm Trend Micro, which documented the new strain on its blog.

In addition, the worm also hijacks the victim's social networking account, by sending out additional invites in order to spread the worm to the victim's friends and contacts. The worm currently is spreading across multiple networks, including hi5.com, friendster.com, myyearbook.com, bebo.com and livejournal.com. It's important to note that practicing basic online street smarts can save you from falling for these types of attacks, regardless of the medium. As always, be extremely cautious about clicking on links in unsolicited messages, even if they appear to have been sent by a friend or acquaintance. Also, don't install applications or programs if you didn't go looking for them. Before you install anything, take a few minutes to research the program and its vendor first. If you decide to install the application, make sure to download it directly from the vendor's Web site, if possible.

See also : destructive payback  hacker  DDoS  
NetLingo Classification: Net Technology