Sat.Nov 04, 2023 - Fri.Nov 10, 2023

Remove 10
article thumbnail

The History of Malware: A Primer on the Evolution of Cyber Threats

IBM Big Data Hub

Designed to exploit a backdoor on Unix systems, and to stay hidden, the worm quickly spread, copying itself over and over again and infecting a full 10% of all networked computers. At the time, only about 60,000 computers had access to the internet, mostly at universities and within the military.