Conficker.C appears on schedule, but only as a whisper The Conficker worm has been a hot topic for months as white hats and black hats have struggled to one-up each other. When security teams broke the randomization cypher Conficker uses and were able to predict which websites the program would target and when, Conficker.B retaliated. That version of the malware used a new encryption cypher to hide its target list (this was broken as well), and was cabable of spreading from infected to non-infected systems over office networks, shared folders, or even USB keys. Now we've come to round C, an event the security industry has been preparing to fight for at least a month. The behavior of previous Conficker versions has been analyzed in order to prepare a defense against Conficker.C, in the hopes of stopping the worm once and for all. As of this writing—near the end of April 1, Conficker.C's supposed launch date—have researchers succeeded in slamming down a bulkhead to contain the worm? http://arstechnica.com/security/news...-a-whisper.ars |
All times are GMT +1. The time now is 03:59. |
Powered by vBulletin® - Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO