Last-minute Conficker survival guide : Christopher Null : Yahoo! Tech
http://tech.yahoo.com/blogs/null/132464
tech.yahoo.com: Conficker tips
An article about Conficker virus.Computer Worms - Conficker| Microsoft Security
Viruses And That-ICT
Ha ha...as if a bounty shall do your hopelessness any good....
The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction.DroneBL Blog: Network Bluepill - stealth router-based botnet has been DDoSing dronebl for the last couple of weeks
psyb0t
@AlohaArleen Could it be the current worm? http://is.gd/otVx [from http://twitter.com/dc0de/statuses/1373557182]
You are only vulnerable if: * Your device is a mipsel (MIPS running in little-endian mode, this is what the worm is compiled for) device. * Your device also has telnet, SSH or web-based interfaces available to the WAN, and * Your username and password combinations are weak, OR the daemons that your firmware uses are exploitable. As such, 90% of the routers and modems participating in this botnet are participating due to user-error (the user themselves or otherwise). Unfortunately, it seems that some of the people covering this botnet do not understand this point, and it is making us look like a bunch of idiots.