Close-up: Worms

Microsoft Corp., the Federal Computer Incident Response Center and many other organizations first put out alerts back in mid-July for the vulnerability used by the Blaster worm and the Welchia variant. Microsoft made the patch available at that time.

The original worm was easier to block because it only used one of the exploits for the vulnerability and did not spread rapidly. The variant, however, rooted quickly through networks, looking for Blaster by several means in order to remove it and automatically apply the Microsoft patch. "That generates a huge amount of traffic inside the organization...and it can take weeks to a month to roll out a patch," said Vincent Weafer, senior director of Symantec Corp.'s Security Response Center. There are still several other ways to exploit the vulnerability, so systems administrators and home users should continue working to apply the patch on any untouched systems, warned Scott Paisley, technology director for Internet Security Systems.


  • Congress
    U.S. Capitol (Photo by M DOGAN / Shutterstock)

    Funding bill clears Congress, heads for president's desk

    The $1.3 trillion spending package passed the House of Representatives on March 22 and the Senate in the early hours of March 23. President Trump is expected to sign the bill, securing government funding for the remainder of fiscal year 2018.

  • 2018 Fed 100

    The 2018 Federal 100

    This year's Fed 100 winners show just how much committed and talented individuals can accomplish in federal IT. Read their profiles to learn more!

  • Census
    How tech can save money for 2020 census

    Trump campaign taps census question as a fund-raising tool

    A fundraising email for the Trump-Pence reelection campaign is trying to get supporters behind a controversial change to the census -- asking respondents whether or not they are U.S. citizens.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.