“It can be used to attack as well as to spy. REUTERS/Nicky LohĬomputer security experts who have analyzed the Conficker worm’s code say it is designed to begin a new phase on April 1, and while it’s unclear whether it will unleash havoc or remain dormant, its stubborn presence is rattling businesses with multimillion-dollar budgets to fight cyber crime.Ĭonficker, believed to reside on 2 million to 12 million computers worldwide, is designed to turn an infected PC into a slave that responds to commands sent from a remote server that controls an army of slave computers known as a botnet. An employee poses with the low-cost Asus Eee PC laptop inside a mall in Taipei February 25, 2009.
0 Comments
Leave a Reply. |