In 2008, researchers were touting the defeat of the Storm worm — the most notorious example of the malware category that self-propagates through remote exploits, email, network shares, removable drives, file-sharing or instant messaging applications. Some would argue that despite the name, Storm was not a traditional worm at all, since it required a human-computer…