Similar Articles |
|
InternetNews March 23, 2006 Michael Hickins |
IBM Readies 'Virtual' Worm-Detection Big Blue's new worm-detection system is preparing to lure worms. The feature entices a worm to attack by creating a virtual environment and then isolating the offending virus or worm. |
IEEE Spectrum December 2007 Nucci & Bannerman |
Controlled Chaos We need to exploit the science of order and disorder to protect networks against coming generations of superworms. |
CIO June 15, 2003 Dylan Tweney |
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. |
Science News August 25, 2007 Julie J. Rehmeyer |
Math Trek: Squashing Worms A mathematician and theoretical computer scientist at Microsoft Research has mathematically analyzed the question of which computers to patch first when a mutating worm is spreading through the Internet. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
PC World September 4, 2001 Kim Zetter |
Did FBI Ignore Code Red Warning? Fast-spreading malicious worm may have had a less successful predecessor... |
T.H.E. Journal August 2005 Irene Sandler |
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. |
InternetNews May 26, 2004 Ryan Naraine |
Korgo Worm Targets LSASS Flaw The detection of a new network worm is a clear indication that users have still not applied Microsoft's MS04-011 update. |
IEEE Spectrum March 2013 David Kushner |
The Real Story of Stuxnet How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program |
Knowledge@Wharton September 10, 2003 |
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. |
PC World January 27, 2003 Williams et al. |
Spread of Slammer Worm Slows Investigators are searching for the source of the worm that caused major disruptions to Internet service over the weekend. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
InternetNews February 9, 2004 Sharon Gaudin |
Stripped-Down MyDoom Hits Microsoft.... Again A new variant of the virulent MyDoom worm has been found in the wild, launching what one analyst fears may be a vicious attack against Microsoft Corp.'s Web site. |
Scientific American June 2009 Michael Moyer |
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses |
InternetNews December 23, 2003 Sharon Gaudin |
2003 'Worst Year Ever' for Viruses, Worms In no other year have computer viruses and worms wreaked so much havoc and caused so much damage as in this past year, according to security analysts. |
PC World August 23, 2002 Frank Thorsberg |
The World's Worst Viruses Check out our list of nasty computer viruses -- and find out how to save your PC from infection. |
PC World May 2003 Daniel Tynan |
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. |
PC Magazine October 14, 2003 |
The Lookout: Blaster and SoBig Move In The Blaster worm continued to tear through the Internet in August, followed almost immediately by an improved version of the SoBig worm, as security experts struggled to find and fix infected systems. |
PC World August 12, 2002 Tom Mainelli |
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. |
PC World December 2000 Kim Zetter |
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... |
PC Magazine July 13, 2004 Alexandra Robbins |
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. |
Unix Insider January 2001 Sandra Henry-Stocker |
Understanding viruses What exactly is a virus, how does it work, and how can you protect your system from one? The author explains the difference between viruses and worms, and why keeping up with and preventing them is so difficult... |
PC Magazine September 10, 2003 Sebastian Rupley |
Could Another SoBig Attack Be Coming This Week? Some virus experts are concerned that September 11 might be the target date for another attack. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders... |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. |
PC World September 18, 2001 Frank Thorsberg |
Multi-Fanged Worm Starts Global Attack New mass-mailing worm starts sophisticated attack on PCs and servers worldwide... |
HBS Working Knowledge October 20, 2003 Wendy Guild Swearingen |
New Rules for Information Security In a new book from Harvard Business School Press, Digital Defense, Thomas J. Parenty explains how security technologies are changing the rules of business. Plus: Q&A |
InternetNews March 1, 2005 Jim Wagner |
Fresh Bagle Attacks Under Way A wave of Bagle variants is slipping past anti-virus software and into computers. |
InternetNews August 17, 2005 Tim Gray |
Windows Worm Goes Global The Zotob.B virus and its variants are now using chat channels to allow hackers to control infected PCs. |
PC World December 4, 2002 Paul Roberts |
Klez Worm Was Worst of 2002 The prolific virus was reported more than any other this year, and simple human error likely caused its spread. |
InternetNews March 16, 2004 Sharon Gaudin |
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. |
InternetNews January 22, 2009 Richard Adhikari |
Downadup: The Web's Next Big Threat? Experts blame a lack of patching and an advanced design for the rise of a worm that could outpace Storm. |
PC World October 24, 2007 Erik Larkin |
The Internet's Public Enemy Number One The Storm Worm has infected so many machines that it's now one of the most powerful supercomputers. |
PC World September 2002 Andrew Brandt |
Klez: The Virus That Won't Die Already the most prolific virus ever, Klez continues to wreak havoc. |
PC World November 2004 Dan Verton |
Biography of a Worm Can anything stop the next global virus outbreak? We follow the trail of one recent worm to see how the security system works--and whether it can be fixed. |
National Defense March 2014 Robert Johnston |
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. |
PC World August 2, 2001 Frank Thorsberg |
Double Trouble: Code Red and Sircam Plagues Continue Computer users face high-profile threats from multiple sources... |
InternetNews June 4, 2004 Ryan Naraine |
Look Out For 3-Headed Plexus Worm A patch Microsoft issued in April could fend off the malicious mutant. |
PC World November 2005 Erik Larkin |
Threat Alert: Instant Messaging Attacks Worms disguised as harmless links or attachments wriggle through chat software. |
InternetNews February 12, 2004 Ryan Naraine |
MyDoom Ends but Open Ports Attracting Mutants Microsoft releases a virus removal tool, but unpatched drone machines are still a major threat. |
InternetNews June 16, 2005 Tim Gray |
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. |
InternetNews December 8, 2005 Jim Wagner |
Sober Worm Has Nazi Connection The infamous Sober worm is set to rear its ugly head again in a New Year's activity that has security officials expecting the worst. |
InternetNews January 21, 2005 Sean Michael Kerner |
The Worm in CNN's Headlines A recent virus threat masquerades as a legitimate headline pulled right from the news Web site. |
CIO October 15, 2003 Paul Roberts |
Virus Attacks What a month. Human frailty, spam and a dangerous Microsoft Windows vulnerability combined to produce four major Internet worm attacks in August. A rundown. |
InternetNews March 1, 2004 Jim Wagner |
New Worms Mean March Madness for IT Pros The latest 'Bagle' worm leaves a bad taste, but it's the return of the Netsky worm that has many security experts worried. |
Technology Research News December 17, 2003 Kimberly Patch |
Device guards Net against viruses Ordinary computers have no chance of being able to monitor the huge volumes of traffic flowing through the Internet. Specialized hardware, however, can. A device is poised to serve as a network sentry, scanning the full contents of every packet for signs of viruses and the like. |
InternetNews May 6, 2004 Ryan Naraine |
MS to Help Zap Worms Automatically Microsoft is working on a plan to distribute worm removal tools within automatic updates by the end of this year. |
PC Magazine August 19, 2003 Sheryl Canter |
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? |