If you were surfing the 'net yesterday, you might've noticed having trouble reaching some sites. If you work in IT, you might have gotten a phone call yesterday morning to come in and start putting ...
Microsoft's policy of relying on software patches to fix major security flaws was questioned Monday after a series of internal e-mails revealed that the software giant's own network wasn't immune from ...
Analyst firms have begun to weigh in with initial estimates of the damage done by the SQL Slammer worm, the virulent program that spread quickly throughout the Internet a week ago. On Thursday, London ...
On January 25 th 2003, the Slammer worm exploited a vulnerability in SQL Server 2000, to execute a buffer overflow attack, affecting customers of Microsoft’s relational database management system.
BOSTON — Still patching your SQL Server databases? Well, be sure not to miss the post-Slammer sale! The new W32.Slammer worm, a nuisance for network administrators worldwide, has turned into a ...
A security researcher whose code was probably used as the basis for the recent SQL Slammer worm says that such sample code has "an important and beneficial role" in Internet security, and that he has ...
It has been said that we’re all but food for the worms. In the rush to create a worldwide network, we have once again rendered ourselves food for worms, albeit an entirely different kind of worm, in a ...
Upfront preparation helped my company ward off the SQL Slammer worm, which exploits a buffer overflow vulnerability in Microsoft SQL Server and creates a flood of packets, similar to a ...
While organizations around the world this week scrambled to disinfect and patch systems that had been hit by the dangerous new W32.Blaster Internet worm, John Halamka could sit back and relax. “I’m ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results