Feeds

Have you got worms?

Virus scare story of the week

  • alert
  • submit to reddit

High performance access to file storage

It's been at least a fortnight since the world was last ravaged by a flesh-eating computer virus. So fret no more. Today, we've all got to get on our hands and knees and watch out for a blood sucking worm that will trash your computer faster than a goose with the squits. The ExploreZip or ZippedFiles worm has already drilled down into thousands of PCs in the US, Europe and Far East, and experts are warning it could spread around the world in a matter of hours. As hysteria broke out in all the world's major financial centres PC users were being advised not to panic. But how do you know if you've got worms? The attachment looks like a WinZip archive file and when you try to unzip it you will get a fake error message indicating a corrupted file. Spreading like a chain letter, the worm will then try to delete your files on any accessible disk drives, including all network drives which could be potentially very damaging for businesses. The files at risk are Microsoft Word documents, Microsoft Excel spreadsheets, Microsoft PowerPoint presentations and certain programming source files. Once it's wormed its way into your system and wreaked havoc it will then attach itself to your email and attack other people in your address book. "This seems to be spreading fast, but not as fast as Melissa," said Mikko Hypponen, manager of anti-virus research at Data Fellows Corporation. "The key issue here is that messages sent by ZippedFiles are very credible—they are very normal-looking replies to messages you have sent earlier. "You're quite likely to trust these messages and open the attachment," he said. De-worming tablets are available from Datafellows or any good pet shop. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.