Malicious Software Exploiting Windows Autorun, Drops
Microsoft saw that malware infections, which took advantage of Windows Autorun utility, dropped nearly instantly following the automatic deactivation of the feature within the previous editions of the Windows OS (operating system). The Register published this in news n June 14, 2011.
According to an evaluation by Microsoft, there was 1.3m fewer infections in Windows Vista and Windows XP during March-May 2011 after the deactivation in February 2011 in comparison with those during February-April 2011 when the change hadn't yet been performed. By May 2011, assaults against Vista computers declined 74% while those against XP systems, 59%.
The contamination percentages for Windows Vista and Windows XP plummeted quite considerably, stated senior program manager Holly Stewart with MMPC (Microsoft malware Protection Center). ComputerWorld published this in news on June 14, 2011.
The software giant eventually zeroed Autorun within Windows 7; however till now, those using previous editions were forced to manipulate inside Windows registry alternatively load certain update for disabling it. If the change is introduced in the authorized Windows Update system, it could result in innumerable users disabling Autorun automatically.
Stated group manager Jerry Bryant for Response Communications at Microsoft, it was about the right period currently when the change could be pushed industry wide as well as experience a considerable influence on the way malicious software disseminated. The development was sure to aid in increased safeguard of the ecosystem, Bryant said in addition. The Register published this.
MMPC compiled certain statistics, according to which, starting January 2011, the month preceding the shipment of the Autorun upgrade, there has been a 62% drop in contamination rates for XP Service Pack 3, the only edition that Microsoft still supports, while the rates dropped 68% for Vista Service Pack 1 and 82% for Vista Service Pack 2 during the same time.
Moreover, starting May 2011, Microsoft witnessed slightly over 400,000 contaminations due to malicious software, which exploited the Windows Autorun utility, plummeting from the highest count of approximately 1.8m during June 2010. Nearly instantly when Microsoft released the update, the company witnessed a likewise decline of contaminations, albeit it was not similarly steep.
Related article: Malicious Scripts with Zero-byte Padding can Pass Undetected
» SPAMfighter News - 6/23/2011
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!