Common Malware Enumeration (CME)
News > Industry News Coverage (2004 Archive)  

Industry News Coverage (2004 Archive)

Below is a comprehensive monthly review of the news and other media's coverage of CME. A brief summary of each news item is listed with its title, author (if identified), date, and media source.

November 2004

CNET.com, November 25, 2004

CME was the main topic of a November 25, 2004 article on CNET.com entitled "Standardised malware naming for the new year." The article stated: "A new initiative that aims standardise malware naming may be in operation as early as January 2005. The US Department of Homeland Security's Computer Emergency Readiness Team, US-CERT, is set to coordinate a Common Malware Enumeration initiative among anti-virus vendors, according to a letter sent to The SANS Institute and signed by representatives of the DHS, Symantec, Microsoft, McAfee, and Trend Micro. Rather like MITRE Corp's Common Vulnerabilities and Exposures (CVE) list, US-CERT will maintain and coordinate a database of malware identifiers."

TechWeb.com, November 24, 2004

CME was the main topic of a November 24, 2004 article on TechWeb.com entitled "Order To Come To Virus Naming Chaos." The article mentions US-CERT, describes CME, and included excerpts from the letter to the SANS Institute's Internet Storm Center: "As a 'neutral third party' in the marketplace, US-CERT will coordinate with security vendors to implement a CME [Common Malware Enumeration] malware identification scheme. Limited operational capability is expected first quarter, 2005; this phase will concentrate on the most important threats, including the recent Beagle/Bagle variants." A second excerpt stated: "Once all parties adopt a neutral, shared identification method, effective information sharing can happen faster and with more accuracy, making it easier to distinguish between very similar threats."

Information Week's Compliance Pipeline, November 24, 2004

CME was the main topic of a November 24, 2004 article on Information Week's Compliance Pipeline entitled "Order To Come To Virus Naming Chaos." The article mentions US-CERT, describes CME, and included excerpts from the letter to the SANS Institute's Internet Storm Center: "As a 'neutral third party' in the marketplace, US-CERT will coordinate with security vendors to implement a CME [Common Malware Enumeration] malware identification scheme. Limited operational capability is expected first quarter, 2005; this phase will concentrate on the most important threats, including the recent Beagle/Bagle variants." A second excerpt stated: "Once all parties adopt a neutral, shared identification method, effective information sharing can happen faster and with more accuracy, making it easier to distinguish between very similar threats."

CME Initiative's Open Letter on SANS Internet Storm Center, November 23, 2004

An open letter from an AV customer to AV vendors was posted to the SANS Internet Storm Center calling for the vendors to solicit the help of a neutral 3rd party like SANS or US-CERT to help solve the malware identification problem. The CME team drafted a response that was co-signed by MITRE's CME Team, US-CERT/DHS representatives, and the participating vendors. The response letter was posted by the SANS Internet Storm Center on Wednesday, November 23, 2004: http://isc.sans.org/diary.php?date=2004-11-23).

The letter generated press hits and discussion list postings both in the US cyber-media as well as European outlets, including the following:

Back to top

October 2004

Federal Computer Weekly, October 11, 2004

CME was mentioned in an October 11, 2004 article in Federal Computer Weekly entitled "Industry fears security setbacks: Amit Yoran's departure from DHS may spur re-evaluation of role" by Florence Olsen. In discussing Yoran's efforts on the National Cyber Alert System, the article states: "But other cybersecurity projects, not so visible or well publicized, could have an equal or greater impact on cyber security, some industry officials said. "One such program was an initiative to gather vendors' virus signature files, through the department's U.S. Computer Emergency Readiness Team (US-CERT) Web site, for federal civilian agencies as soon as the vendors released them. Yoran was leading efforts to standardize virus nomenclature and coordinate virus responses, said Tom Simmons, director of federal markets for Trend Micro, Inc., an antivirus software company."

Back to top

September 2004

SC Magazine, September 2004

CME was mentioned in a September 2004 article in SC Magazine entitled "The Need to Define Malware" by David Perry. The article discusses a new, 1-year effort called the anti-virus nomenclature project (AVNP), which had its first meeting at the 2004 Virus Bulletin conference in Chicago, Illinois, USA. The AVNP effort hopes to establish industry consensus on the definition and use of words such as virus, worm and infection. Discussing CME's relationship with AVNP, the author states: "The panel was made up of a number of experts, anti-virus vendors, customers, academics and the U.S. Department of Homeland Security. This last group may be a surprise addition but the Department is conducting a Common Malware Enumeration project (CME). When asked how they would count what nobody can even define, they agreed to join the deliberation."

Back to top