The Storm virus was highly potent and its latent hidden nature prevented it from being detected by the antivirus programs and the spyware detecting software. The threat that was posed by the storms virus was that “worms like Storm are written by hackers looking for profit, and they’re different. These worms spread more subtly, without making noise. Symptoms don’t appear immediately, and an infected computer can sit dormant for a long time. If it were a disease, it would be more like syphilis, whose symptoms may be mild or disappear altogether, but which will eventually come back years later and eat your brain.” (Schneier, 2007) The seeming unsuspicious email acted as an ant colony with different duties assigned to the program content. Moreover the virus has the potential and the characteristic to stay hidden and inactive for long period of time which made it not depict any symptoms associated with viruses. Instead the virus was hidden and silent and its stealth was undetected by the prominent antivirus programs and security systems installed for protecting the personal computers. This was the main reason why the Storm virus was able to traverse through the computers on the network in a rapid pace while remaining undetected by the masses.