Get a Pentest and security assessment of your IT network.

Cyber Security

From Gimmiv to Conficker: MS08-067 Under The Microscope

The critical MS08-067 vulnerability used by the Conficker worm continues to be a lucrative security hole for cybercriminals. Three different malware families were already using the code execution hole to test the effectiveness of exploit code. The researchers Elda Dimakiling, Francis Allan Tan Tan Tan Seng and Scott Wu said the three malware families used different techniques and tricks to launch exploits copied from public Web sites like Milw0rm.com. A total of five Conficker variants would be launched, each more potent than the others.

Source: https://threatpost.com/gimmiv-conficker-ms08-067-under-microscope-092409/72214/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation