Curated from: en.m.wikipedia.org
Ideas, facts & insights covering these topics:
4 ideas
·180 reads
4
Explore the World's Best Ideas
Join today and uncover 100+ curated journeys from 50+ topics. Unlock access to our mobile app with extensive features.
It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever (as of January 2004), exceeding previous records set by the Sobig worm and ILOVEYOU, a record which as of 2019 has yet to be surpassed.
MyDoom is the most devastating computer virus to date, which caused more than $38 billion in damage.
2
56 reads
Mydoom appears to have been commissioned by e-mail spammers to send junk e-mail through infected computers. The worm contains the text message "andy; I'm just doing my job, nothing personal, sorry," leading many to believe that the worm's creator was paid.
Early on, several security firms expressed their belief that the worm originated from a programmer in Russia. The actual author of the worm is unknown.
2
42 reads
Initial analysis of Mydoom suggested that it was a variant of the Mimail worm, hence the alternate name Mimail.R, prompting speculation that the same people were responsible for both worms. Later analyses were less conclusive as to the link between the two worms.
2
40 reads
Mydoom was named by Craig Schmugar, an employee of computer security firm McAfee and one of the earliest discoverers of the worm. Schmugar chose the name after noticing the text "mydom" within a line of the program's code. He noted: "It was evident early on that this would be very big. I thought having 'doom' in the name would be appropriate."
2
42 reads
IDEAS CURATED BY
Every effort has been made to ensure that 'Did You Know' facts published are factual and correct. Sorry for any inconvenience.
CURATOR'S NOTE
MyDoom is the most devastating computer virus to date, which caused more than $38 billion in damage.
“
Learn more about cybersecurity with this collection
Understanding machine learning models
Improving data analysis and decision-making
How Google uses logic in machine learning
Related collections
Similar ideas
15 ideas
Zero-day vulnerability: What it is, and how it works
unboxingspace21.blogspot.com
6 ideas
How to be Safe from Cyber Attacks
unboxingspace21.blogspot.com
18 ideas
Pandemics That Changed History: Timeline
history.com
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
—
100+ Learning Journeys
—
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates