-
So, how does one charm a worm?
NPR: The Tricks And Tools Of Worm Charmers
-
Little doubt remains that the Stuxnet worm represents one of the most sophisticated digital attacks on critical infrastructure systems that cybersecurity researchers have ever seen.
FORBES: Theories Mount That Stuxnet Worm Sabotaged Iranian Nuke Facilities
-
One such tool, the Ramen worm, attacks computers that run a particular version of the Linux operating system.
ECONOMIST: Forensic computing studies the anatomy of computer crime
-
You have Worm's Head on one side and Burry Holms on the other side.
BBC: Rhossili Bay
-
When people drink the water, the worm begins to grow inside them and can reach one meter in length.
CNN: How fight against Guinea worm was won
-
Now, that zombie software is becoming more infectious and sophisticated: One strain in particular, the so-called "Storm worm, " has enslaved between 15 and 50 million PCs, by security researchers' estimates.
FORBES: Zombie Storm Rising
-
This month's update issued patches for 49 vulnerabilities, including one that plugs a hole exploited by Stuxnet, the first-known worm designed to target real-world infrastructure such as power stations, water plants and industrial units.
BBC: Two million US PCs recruited to botnets
-
One of the best known may be Terracycle, which got its start selling fertilizer from worm poop and now has all sorts of backpacks and the like created from recycled juice pouches and other used stuff.
FORBES: What an Idea: Surfboard Bags from Billboards
-
One of the enzymes, a proton pump, was abundant in the roots, the part of the worm that penetrates the bone.
MSN: Zombie worm has no mouth �� but it feasts on whale bones