2009-09-21
The malicious worm could hide in the printer
An expert on computer security Conficker Working Group Rodney Joffe, when cleaning computers from malicious worm Conficker IT-administrators are often overlooked one potential source of reinfection. According to him, should pay more attention to other devices permanently connected to the network - such as printers.
Some printers use an operating system based on Windows, to automatically connect with suppliers of consumables, cartridges when resources are at an end, and these printers can not even figure in the network as the computers and this makes them vulnerable to the virus.
"Conficker" affects all Windows-devices in the network, which means that devices such as network printers can be a source of rapid re-infection, even if the organization already had an expensive procedure for cleaning each computer on your network.
Such re-infection is difficult to detect because these devices are no consoles, allowing to inspect the operating system, so the blame for the re-infection is often passed on to external sources, such as removable disk drives.
Therefore, administrators must re-examine the structure of its network to ensure that all network devices over which they do not have full control, carefully isolated.
Joffe cautioned commercial organizations that they have no illusions about by the fact that the problem is solved Conficker or no longer a threat. According to him, Conficker able not only to disable the entire network, as was the case in Ealing, but remain robust botnet that its creators may still be used to steal sensitive information or conducting cyber attacks.
In addition, he emphasized the outstanding contribution that an organization Conficker Working Group has made in the development of international cooperation in the field of cybernetic solutions of problems.
See more:
Norton Internet Security protects your chicken and caterpillar
Hackers fulfilled the annual plan for six months
Avast Free Antivirus 5.0
Share
Subscribe to:
Post Comments (Atom)
Be Sociable, Share!
Popular Posts
-
Fastest antivirus software 2010 Russia independent information-analytical center Anti-Malware.ru decided to find out which of the f...
-
Sunbelt Software Corporation announced a new product called VIPRE Enterprise for Mac . The new software is based on the popular anti-virus e...
-
Microsoft published a list of antivirus software, which it recommends be used with Windows 7. Of course, the point is not primarily for pers...
-
Trend Micro has signed an OEM agreement with one of the world's largest manufacturers of personal computers - ASUS . Now, Trend Micro ...
-
I decided that would be a good idea to start with a compilation of free downloadable antivirus . Can be free protection effective? I do not ...
-
Cnet is accused of distributing adware through his service Cnet Download. The corresponding statement was received from Gordon Lyon (develop...
-
AV-Comparatives regularly holds testing of anti-virus products by two various ways - the test of proactive protection (reveals ability of a...
-
Internet Explorer 9 is still the most secure browser! In Q2 2011 the company NSS Labs conducted independent research in 20 European countr...
-
Popular anti-virus Avira AntiVir Personal Edition is updated to version 9.0.0.415 . This update contains some additions and corrections ...
-
At the conference, McAfee FOCUS 11 was submitted to next-generation solution for protecting workstations - McAfee Deep Defender . The new a...
No comments:
Post a Comment