Weekly Footprints of Threats

Related Articles

3 Comments

  1. 1

    Sue Z. Humphrey

    Why Conficker has been able to proliferate so widely may be an interesting testament to the stubbornness of some PC users to avoid staying current with the latest Microsoft security patches [ 2 ]. Some reports, such as the case of the Conficker outbreak within Sheffield Hospital’s operating ward, suggest that even security-conscious environments may elect to forgo automated software patching, choosing to trade off vulnerability exposure for some perceived notion of platform stability [ 8 ]. On the other hand, the uneven concentration of where the vast bulk of Conficker infections have occurred suggest other reasons. For example, regions with dense Conficker populations also appear to correspond to areas where the use of unregistered (pirated) Windows releases are widespread, and the regular application of available security patches [ 9 ] are rare.

  2. 2

    Andres Carroll

    Researchers also found multiple references to Appin, an Indian information security software vendor and “ethical hacking” training company. References included “appin” and “appinbot” in “cleartext project and debug path strings,” according to Norman’s report, and some domains used in the APT attacks appeared to have been registered with a corporate Appin email address before being hidden.

    1. 2.1

      R Sachin

      When domains are registered via a reseller’s account, it is to be noted that, most of the domain resellers have localized businesses and are in no way ICANN/Registry accredited registrars. So, these resellers have local clientele.

Comments are closed.

Copyright © 2024 MicroWorld Technologies Inc. - Anti-Virus escanav.com