When the Conficker computer “worm” was unleashed on the world in November 2008, cyber-security experts didn’t know what to make of it. It infiltrated millions of computers around the globe. It constantly checks in with its unknown creators. It uses an encryption code so sophisticated that only a very few people could have deployed it. For the first time ever, the cyber-security elites of the world have joined forces in a high-tech game of cops and robbers, trying to find Conficker’s creators and defeat them. The cops are failing. And now the worm lies there, waiting …
He first spotted it on Thursday, November 20, 2008. Computer-security experts around the world who didn’t take notice of it that first day soon did. Porras is part of a loose community of high-level geeks who guard computer systems and monitor the health of the Internet by maintaining “honeypots,” unprotected computers irresistible to “malware,” or malicious software. A honeypot is either a real computer or a virtual one within a larger computer designed to snare malware. There are also “honeynets,” which are networks of honeypots. A worm is a cunningly efficient little packet of data in computer code, designed to slip inside a computer and set up shop without attracting attention, and to do what this one was so good at: replicate itself.
Related Posts: On this day...
- Swearing child's toy: VTECH phone - 2011
- MacroWikinomics: Nonthreatening web theory primer for business - 2011
- Transformers: The Complete Series on DVD preorders for $60 shipped - 2011
- Life with Ubuntu and a ThinkPad - 2011
- How do emulators work and how are they written? - 2010
- Exclusive BlackBerry tablet information - 2010
- BlackBerry Bold 9650 to hit Verizon "soon" - 2010
- SWORD OF MY MOUTH: Apocalyptic graphic novel about the tyranny of angels - 2010
- Phishing as a day-job - 2010
- HOWTO: Receive an email when someone logs in as root - 2009