Windows worms annoy me. As I read mail using mutt on a FreeBSD system, I ought to have no contact with them. However my e-mail address appears in perl documentation and perl mailing list archives, and it looks like people on Windows actually read these files. Or at least, they download them or cache them locally, which is enough for the scanning worms to find my address.
Most of the recent worms seem to work by social engineering, rather than exploiting any software bug, trying to tempt the user to run untrusted code.
But why does all this crap only ever originate from Windows systems? I'd contend that there is a bug - a design bug in the philosophy of Windows. You don't see people mailing each other Java bytecode and then running that outside a sandbox - so why in recent years did people happily expect to mail each other joke x86 executables? Windows is buggy to provide a user interface that makes no distinction between opening an attached data file, and running untrusted attached executable code. Even if I never use it, and never mailed anyone using it I'd be suffering because of Windows. Someone must be to blame - I demand compenstation! I'd like $1 from Bill Gates for every K of crap sent to me by Windows malware.
Last night's worm's trick seems to be to put the executable inside a zip file, in an attempt to defeat most scanners and mail filters. Judging by its sucess it was quite effective - I've just deleted over 100 of them (or their bounce reports), which was 14 meg. On my suggested compenstation scale, I'd be $14,000 richer. If only.