• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Series
    • CISO Stories
    • Getting the Real Work Done in Cybersecurity
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Partners
    • Become a Partner
    • Landing Pages
  • Hosts
  • Company
    • About
    • Careers
    • Contact

Articles

Confickering The Week Away

Paul Asadoorian April 1, 2009

Conficker, say it with me now, “Con-Fick-er”. I don’t even need to link to anything. All you have to do is read any website about information security this week and you can read something about Conficker. Its been covered to death, but like a flesh eating Zombie, it keeps coming back for more. zombie1.jpg It got ALL the press today (as I write this on April 1, 2009). I woke up this morning and started watching the news, they were talking about Conficker. I got to work (I work from home, so this means I walked downstairs to my office) and my bosses laptop crashed. Everyone joked that it was Conficker. I then proceeded to write a blog posting about Conficker and the cool ways it can be detected. Twitter was buzzing with talk of Conficker, what will it do? Has anyone seen anything? If it wasn’t a blog post centered around an April fool’s joke (okay, some were really funny, like the ASS certification), it was a post about Conficker. Why does a virus/worm get so much press? I’ve struggled to come up with a good reason. It defies logic in my opinion. Lets pretend that I become frustrated with being a jedi whitehat and make the switch to the dark side because I was confused and thought my powers could be used by evil to do good. The first thing I would want to do in order to take over the universe would be to create a botnet, which means I need a worm. I want my botnet to be large and powerful, which means it needs lots of compromised systems. The LAST thing I want is the code I use to achieve supremacy over the universe to be talked about on every major news outlet, blog, twitter, web site, and analyzed by researchers across the globe. So what gives? It certainly could not be the author’s intention to gain popularity. We can speculate all day and night about why we made a big deal about this, but in the end I have to wonder, what else went on this week (and especially today) that we all missed because we were to busy Confickering?
Paul Asadoorian

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

uptrend line arrows with bar chart in stock market on blue color background

Articles /

Ransomware Damage Claims Driving Insurance Hikes

web-application-firewall-comparison-696x423

Articles /

Building a More Secure AppDev Process

apptitude-test

Articles /

Diversifying Cybersecurity Talent Through Aptitude Testing

‹ How-To: Building a Guest Wireless Network For Under $300 – Part I › How NOT to deploy a WIDS: An outsider’s view

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS feed RSS - Posts

Search

Latest Tweets

Tweets by @secweekly
© Security Weekly 2022
Powered by WordPress • Themify WordPress Themes