Did Microsoft Misstep Nurture Blaster?
As spread of the dangerous new W32.Blaster Windows worm slows, attention is shifting to Microsoft’s efforts to help its customers patch vulnerable systems–and some complain of inadequate protection and unreliable information about securing their PCs. W32.Blaster first appeared on the Internet Monday and quickly spread worldwide. It infected hundreds of thousands of computers and caused disruptions on corporate and university networks, as well as on home computers. Blaster targets a Windows component for handling Remote Procedure Call protocol traffic called the Distributed Component Object Model interface, and affects almost every supported version of Windows. As of Wednesday, Blaster had infected more than 225,000 systems worldwide, according to Albert Huger, senior director of engineering at Symantec Security Response. A new variant of Blaster also appeared Wednesday and seemed to be spreading, according to antivirus companies. Full Story