Lunes, Enero 9, 2012

CASE STUDY 1

Conficker was expected to shut down security services, block computers from connecting to security Web sites, and download a Trojan. It was also expected to reach out to other infected computers via peer-to-peer networking and include a list of 50,000 different domains, of which 500 would be contacted by the infected computer on April 1 to receive updated copies or other malware or instructions.

The Conficker worm may have failed to cause the digital pandemonium that some may have feared, but that doesn't mean we are in the clear. Just because the worm failed to create much of a stir on the day it was set to activate doesn't mean it won't wake up and act later.

Today, as on any day, PC users should make sure their systems are patched and running the latest security software. People should patch their systems to close the hole in Windows that Conficker exploits and should update their antivirus software. The major antivirus vendors all have free Conficker removal tools.

The worm also can spread via network shares and removable storage devices like USB thumb drives. So people are advised to use strong passwords when sharing files on a network and to download a patch Microsoft released to address the Autorun feature problem in Windows that makes using removable storage risky.

Walang komento:

Mag-post ng isang Komento