版面有限 部分節錄 更沒空者 請只讀

部分:
For PC users... Article from Yahoo!
Conficker worm plays no tricks on April Fools' Day
By by Glenn Chapman - Thu Apr 2, 2009 12:33AM EDT
SAN FRANCISCO (AFP) -
The Conficker worm's April 1st trigger date came and went without the bedeviling computer virus causing any mischief but security specialists warn that the threat is far from over.
Conficker did just what the "white hats" tracking it expected -- the virus evolved to better resist extermination and make its masters tougher to find.
"There are still millions of personal computers out there that are, unknown to their owners, at risk of being controlled in the future by persons unknown," said Trend Micro threat researcher Paul Ferguson.
"The threat is still there. " "It is pretty sophisticated and state-of-the-art." Ferguson said.
A task force assembled by Microsoft has placed a bounty of 250,000 dollars on the heads of those responsible for the threat.
The worm was programmed to evolve on Wednesday to become harder to stop.
Conficker had been programmed to reach out to 250 websites daily to download commands from its masters, but on Wednesday it began generating daily lists of 50,000 websites and reaching randomly 500 of those.
The worm, a self-replicating program,

takes advantage of networks or computers that haven't kept up to date with security patches for Windows RPC Server Service.
It can infect machines from the Internet or by hiding on USB memory sticks carrying data from one computer to another. Malware could be triggered to steal data or turn control of infected computers over to hackers amassing "zombie" machines into "botnet" armies.

Microsoft has modified its free Malicious Software Removal Tool to detect and remove Conficker. Security firms, including Trend Micro, Symantec and F-Secure, provide Conficker removal services at their websites.
The tell-tale signs that a computer is infected includes the worm blocking efforts to connect with websites of security firms providing online tools for removing the virus.
The US Department of Homeland Security (DHS) released a tool on Monday to detect whether a computer is infected by Conficker.
The agency said the worm detector was developed by the US Computer Emergency Readiness Team (US-CERT).
US-CERT recommended that Windows users apply

Microsoft security patch MS08-067 to help protect against the worm.