Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

3/31/2009
08:07 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BitDefender Releases Free Conficker Removal Tool

Tool, first available for home users last week, now is ready business networks

BUCHAREST, Romania -- March 31, 2009 -- BitDefender, an award-winning provider of innovative anti-malware security solutions, has launched a free tool that removes all versions of the Conficker (or Downadup) worm on both home workstations and business networks. The removal tool can be accessed at http://bdtools.net.

While BitDefender's Conficker removal tool was first available for home users last week, the company has added a similar removal tool for business networks this week. BitDefender's unique network removal tool is scalable and can be used by networks of various sizes. The tool allows IT administrators to easily and centrally remove the Conficker worm from business networks without the need to run a local removal tool on each machine, thus avoiding the risks of the worm spreading throughout the network again.

"BitDefender understands that home workstations are not the only entities being affected by the Conficker worm, business networks are also being infected," said Vlad Valceanu, BitDefender's senior malware analyst. "Businesses worldwide can experience significant losses in productivity or network downtime due to the Conficker worm, which is simply unacceptable for any business, especially in the current economic crisis. BitDefender supports businesses around the globe that are infected by the worm by offering a free and easy-to-use removal tool."

Conficker is a network worm that takes advantage of vulnerabilities in Windows to spread. Once a system is compromised, the worm disables Windows Update and blocks access to anti-virus websites in order to hinder the user's attempts to disinfect the machine. The latest version of Conficker is scheduled to activate on April 1.

Additionally, all BitDefender 2009 products, through automatic updates, have implemented Conficker detection and removal functionality. Non-BitDefender users can access the tool through http://bdtools.net.

Users can see a demonstration of how to use the BitDefender Conficker removal tool on YouTube: http://www.youtube.com/watch?v=P9Oj01CI0dM.

To stay up-to-date on the latest e-threats, sign-up for BitDefender's RSS feeds here.

About BitDefender BitDefender is the creator of one of the industry's fastest and most effective lines of internationally certified security software. Since its inception in 2001, BitDefender has continued to raise the bar and set new standards in proactive threat prevention, emerging as the industry's anti-malware innovator. Every day, BitDefender protects tens of millions of home and corporate users across the globe — giving them the peace of mind of knowing that their digital experiences will be secure. BitDefender solutions are distributed by a global network of value-added distribution and reseller partners in more than 100 countries worldwide. More information about BitDefender and its products are available at the company's security solutions press room. Additionally, BitDefender's www.malwarecity.com provides background and the latest updates on security threats helping users stay informed in the everyday battle against malware.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24285
PUBLISHED: 2021-04-12
INTELBRAS TELEFONE IP TIP200 version 60.61.75.22 allows an attacker to obtain sensitive information through /cgi-bin/cgiServer.exx.
CVE-2021-29379
PUBLISHED: 2021-04-12
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover pa...
CVE-2015-20001
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory as an arbitrary type, which can result in a memory ...
CVE-2020-36317
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the sam...
CVE-2020-36318
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.