BACK TO PCSTATS Follow PCSTATS on Facebook PCSTATS RSS Feed PCSTATS Twitter Feed + Motherboards
+ Videocards
+ Memory
+ Beginners Guides
News & Advanced Search  Feedback?
[X]   Directory of
Guides & Reviews
The PCstats Forums

Beginners Guides
Weekly Newsletter
Archived Newsletters


Beginners Guide: How To Install / Remove an Intel Socket LGA2011 CPU

Clock ticking on worm attack code - Get KB958644 Patch from Microsoft - PCstats.com Clock ticking on worm attack code - Get KB958644 Patch from Microsoft
Fri, January 23 2009 | 1:52AM | PermaLink Feedback?
UPDATE from IHT on this continuing story: Worm infects millions of computers worldwide.

"A new digital plague has hit the Internet, infecting millions of personal and business computers in what seems to be the first step of a multistage attack. The world's leading computer security experts do not yet know who programmed the infection, or what the next stage will be. In recent weeks a worm, a malicious software program, has swept through corporate, educational and public computer networks around the world. Known as Conficker or Downadup, it is spread by a recently discovered Microsoft Windows vulnerability, by guessing network passwords and by hand-carried consumer gadgets like USB keys."

Get the Microsoft Critical Security Patch KB958644 here: Update MS08-067

The BBC reports:"Experts are warning that hackers have yet to activate the payload of the Conficker virus. The worm is spreading through low security networks, memory sticks, and PCs without current security updates.

The malicious program - also known as Downadup or Kido - was first discovered in October 2008. Although the spread of the worm appears to be levelling off, there are fears someone could easily take control of any and all of the 9.5m infected PCs."

"According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.

It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service. Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site."

FULL STORY @ Archived from BBC.CO.UK
http://news.bbc.co.uk/2/hi/technology/7832652.stm
CURRENT Software News on PCSTATS


News Archives by Category
Audio / Sound Beginners Guides Benchmarks
Biometrics BIOS Business / Industry
Cases Chipset Computer / SFF PCs
Cooling / Heatsinks CPU / Processors Digital Cameras
Drivers Editorial Games
Gossip Hard Drives Hardware
Home Theatre Imaging Memory
Mobile Devices Monitors Motherboards
Mouse Pads MP3 Players Networking
Notebooks Operating System Optical Drives
Overclocking Peripherals Power Supply
Press Release Printers Servers
Site News Software Tips
Tradeshows / Events Video Cards Web News
   10 / 01 / 2014 | 6:20AM
Hardware Sections 


google
 
PCSTATS Network Features Information About Us Contact
FrostyTech
TransmetaZone
BeginnersPC
PCSTATS Newsletter
PCSTATS Forums
ShoppingList Assistance
Tech Glossary
Technology WebSite Listings
PermaLink News
Archived News
Submit News (Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Employment
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2014 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.