Windows users brace for Conficker's wiggle

roundup The Conficker worm is keeping security experts on their toes, trying to scope out exactly how and when it might strike.

roundup The Conficker worm is keeping security experts on their toes, trying to scope out exactly how and when it might strike.

Ounce of protection
Rid your computer of Conficker
It's a frustrating but not insurmountable problem. This guide will walk you through how to cleanse your computer and inoculate against other Conficker variants.

<b>Report: Conficker worm bites University of Utah</b>

More than 700 computers at the University of Utah, including those at its three hospitals, have been infected with the worm.
(Posted in Security by Natalie Weinstein)
April 12, 2009 7:04 AM PDT

<b>Conficker also installs fake antivirus software</b>

In addition to dropping a mystery payload on infected machines, the Conficker worm installs software that tries to dupe people into paying nearly $50 for fake antivirus software.
(Posted in Security by Elinor Mills)
April 10, 2009 4:00 PM PDT

<b>Researchers say Conficker is all about the money</b>

Conficker's ties to a large spamming and password-stealing botnet give credence to the speculation that money, and possibly malicious Eastern European hackers, are behind the latest Internet worm infection.
(Posted in Security by Elinor Mills)
April 9, 2009 11:43 AM PDT

<b>Conficker wakes up, updates via P2P, drops payload</b>

Conficker is updating itself on infected computers via peer-to-peer technology and is programmed to stop running on May 3, Trend Micro researchers say.
• Podcast: Conficker using P2P to spread payload
(Posted in Security by Elinor Mills)
April 8, 2009 3:27 PM PDT

Eye chart can help diagnose Conficker

April Fools' Day passed with much angst over and little action from the Conficker worm, but that doesn't mean it's not a threat. Quickly determine if you're infected with this "eye chart."
(Posted in The Download Blog by Seth Rosenblatt)
April 3, 2009 5:36 PM PDT

<b>All quiet on the Conficker front. Now what?</b>

Just because Conficker was quiet doesn't mean it won't act in the future, turning unsuspecting PCs into spam-sending drones or stealthily stealing passwords from people, experts say.
(Posted in Security by Elinor Mills)
April 1, 2009 8:05 AM PDT

<b>Countdown to Conficker--a bust so far</b>

Researchers say the worm is awake on computers in Asia where it's already April 1, but so far it hasn't taken much action. We'll keep you updated here.
(Posted in Security by Elinor Mills)
April 1, 2009 6:35 AM PDT

<b>Podcast: Worm 'phoning home' but getting no answer</b>

Security watchers at McAfee say that Conficker is trying to communicate with master computers but isn't getting through.
(Posted in Larry Magid at Large by Larry Magid)
April 1, 2009 5:21 AM PDT

<b>Conficker flaw reveals which computers are infected</b>

Researchers find flaw in Conficker that lets them detect which computers have the legitimate Microsoft patch and which were "patched" by the worm itself.
• Conficker demonstrates complexity of IT security
(Posted in Security by Elinor Mills)
March 30, 2009 1:54 p.m. PDT

<b>Podcast: Conficker worm dissected</b>

David Perry, education director of Internet security company Trend Micro, discusses the implications of the worm.
(Posted in Larry Magid at Large by Larry Magid)
March 30, 2009 11:04 p.m. PDT

<b>Conficker worm might originate in China</b>

A Vietnamese security firm concludes that the Conficker worm has the same root as the Nimda, which the firm believes originated in China.
• Malware probes find a China angle
(Posted in Security by Dong Ngo)
March 29, 2009 7:30 p.m. PDT

<b>'60 Minutes': What's next for the Conficker worm?</b>

A report on the CBS News television news program examines one of the Internet's most dangerous computer worms.
(Posted in Security by CBS Interactive staff)
March 29, 2009 7:00 p.m. PDT

<b>FAQ: Conficker time bomb ticks, but don't expect boom</b>

Worm's latest variant is set to start hitting random domains on April 1. But security experts say the damage might not be as serious as the hype suggests.
• U.K. parliament computers get Confickered
(Posted in Security by Elinor Mills)
March 25, 2009 5:10 p.m. PDT


Watch CBS Videos Online

Previous coverage

<b>Latest Conficker worm gets nastier</b>

Conficker.C blocks access to protective services, downloads a Trojan, and is programmed to seek out 50,000 domains on April 1, as the authors of the worm try to outsmart security vendors.
(Posted in Security by Elinor Mills)
March 13, 2009 1:22 p.m. PDT

<b>Conficker worm targets Southwest Airlines site</b>

Those flying Southwest Airlines on March 13 were expected to have trouble doing online check-in as the site is being targeted by the Conficker worm, security expert says.
(Posted in Security by Elinor Mills)
March 2, 2009 1:06 p.m. PST

<b>New variant of Conficker worm circulates</b>

New variant of Conficker opens backdoor on infected machines that attacker could use to install malicious programs later.
(Posted in Security by Elinor Mills)
February 23, 2009 4:13 p.m. PST

<b>Microsoft offers $250,000 reward for Conficker arrest</b>

Software giant offers bounty for arrest and conviction related to Conficker Internet worm that spreads via Windows hole, USB drives, and network shares.
(Posted in Security by Ellinor Mills)
February 12, 2009 12:48 p.m. PST

<b>French planes grounded by Windows worm</b>

The French military, despite being warned by Microsoft that the Conficker virus might infect their computer systems, allegedly didn't take sufficient precautions. Result: grounded fighters.
(Posted in Technically Incorrect by Chris Matyszczyk)
February 8, 2009 8:42 a.m. PST

<b>Conficker spreads as Waledec delivers mal-entine</b>

The Conficker/Downadup worm continues spreading via a Windows hole and USB devices, while a Waledec worm tricks victims with Valentine e-mail.
(Posted in Security by Elinor Mills)
January 29, 2009 1:30 p.m. PST

<b>Expert: Worm spreading in many ways becoming an epidemic </b>

he worm known as Kido, aka Conficker or Downadup, evolves to spread via removable devices and other means besides just exploiting a Windows vulnerability.
(Posted in Security by Elinor Mills)
January 15, 2009 2:03 p.m. PST

<b>Internet worm exploits Windows vulnerability</b>

Security hole in Windows that Microsoft released patch for last month is being exploited by worm and bots, Microsoft says.
(Posted in Security by Elinor Mills)
November 26, 2008 1:39 p.m. PST
 

Join the discussion

Conversation powered by Livefyre

Don't Miss
Hot Products
Trending on CNET

HOT ON CNET

Find Your Tech Type

Take our tech personality quiz and enter for a chance to win* high-tech specs!