• How ‘limited’ malcode pulled off the year’s biggest attack

    Experts thought worms targeting the Plug and Play flaw wouldn't do much because only Windows 2000 was affected. So how did they mount the biggest attack since Sasser?

    082670300 pointsBadges:
  • Nimda: Setting a sinister standard?

    The nightmarish Nimda and the worms that are sure to follow in its squirmsteps will look for new ways to catch you with your pants down. SearchWin2000 is trying to fit you with a good "belt" to keep your trousers up.

    ITKE351,275 pointsBadges:
  • Blaster worms wipes out Internet connection settings

    I just found Blaster worms on my m8s Windows 2000 machine. I managed to get rid of them but now all my Internet connection settings are wiped out and I cannot make a new connection -- some remote access management control. I went into the system information and there are several references to this...

    laurapennquakers2,040 pointsBadges:
  • Forecast & Review: Exchange

    The foremost concern on everyone's mind this past year was security, security, security. Between Code Red, Nimda and the other slew of viruses, worms and Trojans that spread throughout the industry, more systems were affected in 2001 than in the last five years combined.

    ITKE351,275 pointsBadges:
  • A week of gloom and Mydoom

    Sobig.F doesn't look so big now. Last summer, that worm infected systems worldwide within a matter of days and, in the process, blazed a path to infamy as the Internet's most virulent e-mail worm. This week, Mydoom-A eclipsed that record.

    Jhogan800 pointsBadges:
  • Can IIS 6.0 take the heat?

    Microsoft's IIS 5.0 was some fine dining for worms. The company needed to make the next version less tantalizing to intruders, and more appealing to customers.

    Margie Semilof4,245 pointsBadges:
  • Worm uses Symantec tools to infiltrate SQL Server

    Considered a moderate threat, the worm gains access to Microsoft's SQL Server and SQL databases by exploiting vulnerabilities in Symantec's antivirus software.

    ITKE351,275 pointsBadges:
  • Case study: One IT department tackles security with NAP

    Fulton County's IT shop started to investigate Network Access Protection, Microsoft's new quarantine technology for laptops, after the Welchia worm brought down its network.

    ctorode880 pointsBadges:
  • Security woes old (worms) and new (phishing)

    Phishing may have IT security administrators worried, but it's the old threats that will pose the most dangerous security risks during the rest of 2004, said Anton Chuvakin, senior security analyst for netForensics, an Edison, N.J.-based security information management company. Keeping abreast of...

    Jan Stafford2,920 pointsBadges:
  • The logical solution to worms like Zotob

    Tiered levels of security are the only realistic way to defend against threats to system flaws, such as the Windows Plug and Play vulnerability, IT professionals and analysts say.

    Margie Semilof4,245 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following