Podcast: Conficker using P2P to spread payload

Security researchers at Trend Micro discover that the Conficker worm is updating itself but can't yet identify the payload

As CNET News has been reporting , researchers at Trend Micro have discovered that the Conficker worm, which did basically nothing on April 1, is now updating itself by using a peer-to-peer network between infected Windows PCs to pass on payload instructions.

Because the worm's instructions are encrypted, as of 7:20 p.m. PDT Wednesday night, researchers were still unable to determine the nature of the payload, according to Trend Micro education director David Perry.

Still , in this audio podcast, Perry had plenty of information about how the worm is finally passing on instructions to infected PCs.

Podcast

Tags:
Security
About the author

Larry Magid is a technology journalist and an Internet safety advocate. He's been writing and speaking about Internet safety since he wrote Internet safety guide "Child Safety on the Information Highway" in 1994. He is co-director of ConnectSafely.org, founder of SafeKids.com and SafeTeens.com, and a board member of the National Center for Missing & Exploited Children. Larry's technology analysis and commentary can be heard on CBS News and CBS affiliates, and read on CBSNews.com. He also writes a personal-tech column for the San Jose Mercury News. You can e-mail Larry.

 

ARTICLE DISCUSSION

Conversation powered by Livefyre

Don't Miss
Hot Products
Trending on CNET

Hot on CNET

Saving your life at speed and in style

Volvo have been responsible for some of the greatest advancements in car safety. We list off the top ways they've kept you safe today, even if you don't drive one.