Anonymous Reader writes “Exploiting Windows vulnerabilities, this worm will proliferate in networks. First it copies itself into a shared folder on the local machine. From there, the P2P network takes over to contact other computers in the network and helps them download and execute the infected file.”
Link: net-security.org
Category:
- Security