The History of Malware: A Primer on the Evolution of Cyber Threats
IBM Big Data Hub
NOVEMBER 6, 2023
Designed to exploit a backdoor on Unix systems, and to stay hidden, the worm quickly spread, copying itself over and over again and infecting a full 10% of all networked computers. At the time, only about 60,000 computers had access to the internet, mostly at universities and within the military.
Let's personalize your content