{"id":4073,"date":"2020-10-09T09:32:21","date_gmt":"2020-10-09T09:32:21","guid":{"rendered":"https:\/\/www.adlice.com\/?p=4073"},"modified":"2022-12-21T10:29:27","modified_gmt":"2022-12-21T10:29:27","slug":"what-is-a-worm","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/de\/what-is-a-worm\/","title":{"rendered":"What is a Computer Worm ? How to Remove ?"},"content":{"rendered":"<div class=\"wp-block-ub-table-of-contents-block ub_table-of-contents\" id=\"ub_table-of-contents-08142c21-9deb-469a-960a-7798af9d4cdd\" data-linktodivider=\"false\" data-showtext=\"show\" data-hidetext=\"hide\" data-scrolltype=\"auto\" data-enablesmoothscroll=\"false\" data-initiallyhideonmobile=\"false\" data-initiallyshow=\"true\"><div class=\"ub_table-of-contents-header-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-header\" style=\"text-align: left; \">\n\t\t\t\t<div class=\"ub_table-of-contents-title\"><\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div><div class=\"ub_table-of-contents-extra-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-container ub_table-of-contents-1-column \">\n\t\t\t\t<ul style=\"\"><li style=\"\"><a href=\"https:\/\/www.adlice.com\/de\/what-is-a-worm\/#0-history-of-worm-attacks\" style=\"\">History of worm attacks<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/de\/what-is-a-worm\/#1-how-do-computer-worms-spread-\" style=\"\">How do computer worms spread ?<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/de\/what-is-a-worm\/#2-worms-attacks-nowadays\" style=\"\">Worms attacks nowadays<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/de\/what-is-a-worm\/#3-recent-computer-worm-infections\" style=\"\">Recent computer worm infections<\/a><\/li><li style=\"\"><a href=\"https:\/\/www.adlice.com\/de\/what-is-a-worm\/#4-how-do-i-remove-a-worm-\" style=\"\">How do I remove a worm ?<\/a><\/li><\/ul>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-accent-color has-text-color wp-block-heading\" id=\"0-history-of-worm-attacks\">History of worm attacks<\/h2>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_worm\">Computer worms<\/a> <strong>were the second types of malware developed<\/strong>. At the beginning, like computer viruses, they were not designed to be malicious. One of them, called MORRIS, was designed to determine how large the Internet was (1988), but due to poor programmation ended damaging infrastructures and delete files. Some of them stay in memory like the infamous ILOVEYOU worm that destroyed the content of the infected computer and the SASSER worm that rebooted computers randomly.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-accent-color has-text-color wp-block-heading\" id=\"1-how-do-computer-worms-spread-\">How do computer worms spread ?<\/h2>\n\n\n\n<p>Computers worms are designed to leverage <a href=\"https:\/\/en.wikipedia.org\/wiki\/Vulnerability_(computing)\">software vulnerabilities <\/a>that allow them to <strong>gain control over an operating system<\/strong>, then <strong>scan the network<\/strong> for other vulnerable devices and so on. It\u2019s quite difficult to remove a worm attack because, unless the vulnerability it uses to propagate is fixed beforehand, the worm will likely work back again in no time.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"640\" height=\"210\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/worms_tech.jpg\" alt=\"\" class=\"wp-image-4074\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/worms_tech.jpg 640w, https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/worms_tech-300x98.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-accent-color has-text-color wp-block-heading\" id=\"2-worms-attacks-nowadays\">Worms attacks nowadays<\/h2>\n\n\n\n<p>Security in programming has become much drastic, leading to less vulnerabilities left unpatched or exploitable. However, sometimes a new worm is created and eventually makes headlines. Indeed, many devices (computers, but also connected objects) are now connected to the Internet and when a new worm hits, a huge <a href=\"https:\/\/www.adlice.com\/malware-virus-what-are-they\/\">botnet<\/a> can be created in a very small time frame.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-accent-color has-text-color wp-block-heading\" id=\"3-recent-computer-worm-infections\">Recent computer worm infections<\/h2>\n\n\n\n<p>One of the most recent (May 2017) worm and the most famous one is WANNACRY. All operating systems running from Windows XP to Windows 10 were vulnerable and it\u2019s estimated that over 300,000 computers were infected by the work in a time lapse of only four days.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"758\" height=\"632\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/Wannacry.jpg\" alt=\"\" class=\"wp-image-4076\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/Wannacry.jpg 758w, https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/07\/Wannacry-300x250.jpg 300w\" sizes=\"(max-width: 758px) 100vw, 758px\" \/><\/figure>\n\n\n\n<p>It used to install  <a href=\"https:\/\/www.adlice.com\/ransomware-spreading-prevention\/\">ransomware<\/a> and it\u2019s believed that the authors were paid around $150,000,000 by the victims.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-accent-color has-text-color wp-block-heading\" id=\"4-how-do-i-remove-a-worm-\">How do I remove a worm ?<\/h2>\n\n\n\n<p>As stated before, computer worms method of propagation rely on software vulnerabilities. By keeping your system and your application updated, you greatly minimize the risk of being targeted by a computer worm. <a href=\"https:\/\/www.adlice.com\/ucheck\/\">Adlice UCheck<\/a> can help with you, fetching and always installing the latest versions of your software. <\/p>\n\n\n\n<p>You can also install an antivirus software with a real-time protection, such as <a href=\"https:\/\/www.adlice.com\/roguekiller\/\">RogueKiller<\/a>, to prevent malware from installing. If the malware is already in place you can also try our general <a href=\"https:\/\/www.adlice.com\/how-to-remove-malware-from-my-pc\/\">malware removal guide<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computers worms are designed to leverage vulnerabilities that allow them to gain control over a device then scan the network for other vulnerable devices and so one<\/p>\n","protected":false},"author":1,"featured_media":4161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103],"tags":[2847,48,2968],"class_list":["post-4073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guide","tag-computing","tag-removal","tag-worm","category-103","description-off"],"views":6638,"yoast_score":67,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a Computer Worm ? How to Remove \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Computer worms are malware replicating on the network. Learn how it works, and how to remove with this guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/what-is-a-worm\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Computer Worm ? How to Remove \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Computer worms are malware replicating on the network. Learn how it works, and how to remove with this guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/what-is-a-worm\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-09T09:32:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:29:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"What is a Computer Worm ? How to Remove ?\",\"datePublished\":\"2020-10-09T09:32:21+00:00\",\"dateModified\":\"2022-12-21T10:29:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/\"},\"wordCount\":367,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg\",\"keywords\":[\"computing\",\"removal\",\"worm\"],\"articleSection\":[\"Guide\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/\",\"url\":\"https:\/\/www.adlice.com\/what-is-a-worm\/\",\"name\":\"What is a Computer Worm ? How to Remove \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg\",\"datePublished\":\"2020-10-09T09:32:21+00:00\",\"dateModified\":\"2022-12-21T10:29:27+00:00\",\"description\":\"Computer worms are malware replicating on the network. Learn how it works, and how to remove with this guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/what-is-a-worm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/what-is-a-worm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Computer Worm ? How to Remove ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/de\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Computer Worm ? How to Remove \u2022 Adlice Software","description":"Computer worms are malware replicating on the network. Learn how it works, and how to remove with this guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/what-is-a-worm\/","og_locale":"de_DE","og_type":"article","og_title":"What is a Computer Worm ? How to Remove \u2022 Adlice Software","og_description":"Computer worms are malware replicating on the network. Learn how it works, and how to remove with this guide.","og_url":"https:\/\/www.adlice.com\/what-is-a-worm\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2020-10-09T09:32:21+00:00","article_modified_time":"2022-12-21T10:29:27+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Verfasst von":"tigzy","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/what-is-a-worm\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/what-is-a-worm\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"What is a Computer Worm ? How to Remove ?","datePublished":"2020-10-09T09:32:21+00:00","dateModified":"2022-12-21T10:29:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/what-is-a-worm\/"},"wordCount":367,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg","keywords":["computing","removal","worm"],"articleSection":["Guide"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/what-is-a-worm\/","url":"https:\/\/www.adlice.com\/what-is-a-worm\/","name":"What is a Computer Worm ? How to Remove \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg","datePublished":"2020-10-09T09:32:21+00:00","dateModified":"2022-12-21T10:29:27+00:00","description":"Computer worms are malware replicating on the network. Learn how it works, and how to remove with this guide.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/what-is-a-worm\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/what-is-a-worm\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/what-is-a-worm\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/worm-computer.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/what-is-a-worm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/de\/"},{"@type":"ListItem","position":2,"name":"What is a Computer Worm ? How to Remove ?"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/4073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/comments?post=4073"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/4073\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media\/4161"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media?parent=4073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/categories?post=4073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/tags?post=4073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}