| News & Events (2005 Archive)December 20, 2005 CME List Enhanced with Links to Vendor Aliases The CME List  has been enhanced with links to vendor aliases for each CME identifier (CME-ID) included on the list. Users can now review a CME-ID and then follow the url for one or more of the vendor aliases to retrieve additional data about the threat and/or, depending on the vendor, fix information. For example, in addition to a description of the malware and the date the identifier was assigned, the CME List entry for CME-681  now includes links for the following aliases: Aliases on the CME Web site are provided by members of the CME Editorial Board  and CME Sample Redistribution Group. Visit the CME List  to review all CME-IDs and aliases. CME to Host Booth at Homeland Security for Networked Industries 2006 Conference & Expo in January MITRE is scheduled to host a CME/OVAL/CVE  exhibitor
	  booth at Homeland Security
	  for Networked Industries (HSNI) 2006 Conference & Expo  on January
	  9-11, 2006 at Walt Disney World Resort, in Orlando, Florida, USA. The conference
	  is "the first of its kind to encourage cross-industry collaboration on network
	  security issues pertinent to America's critical infrastructures [or those]
	  networks which serve as the backbone for daily life for the American public." It
	  is "an opportunity to listen and network with IT decision makers from a variety
	  of networked industries including utilities, telecom and transportation as
	  well as government." Organizations listed on the Products and Services Including CME Identifiers  page will also be exhibiting. Please stop by Booth 117, or any of these booths, and say hello. Back to top December 1, 2005 Trend Micro, Inc. Includes CME Identifiers in Virus Encyclopedia and Alerts Trend Micro, Inc. issued a virus
	    alert on November 21, 2005 that referenced CME-681. Numerous other alerts in the Trend
	    Micro Virus Encyclopedia also reference CME identifiers. See the Products
	    and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products and services. Trend Micro is a founding member of the CME
	    Editorial Board and the CME Sample Redistribution
	    Group. Panda Software International S.L.'s Virus Encyclopedia Including CME-IDs as Aliases CME identifiers are included as aliases in Panda
	    Software International S.L.'s free Virus
	    Encyclopedia. CME-681 was included as an alias for the W32/Sober.AH.worm. Numerous other entries in the encyclopedia also include CME-IDs. See the Products and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products and services. Panda Software is a member of the CME
	    Editorial Board and the CME Sample Redistribution
	    Group. Hong Kong CERT Includes CME Identifier in Virus Alert Hong
	    Kong CERT issued a virus
	    alert on November 23, 2005 that referenced CME-681.
	    See the Products and Services Including
	    CME Identifiers page for a complete list of the organizations that are
	    including or have included CME identifiers in their anti-virus and information
	    security products and services. Counterpane Internet Security, Inc. Includes CME Identifier in Virus Alert Counterpane
	    Internet Security, Inc. issued a virus alert on November 22, 2005 entitled "CME
	    681 - Sober Virus Spoofing FBI and CIA" that referenced CME-681.
	    See the Products and Services Including
	    CME Identifiers page for a complete list of the organizations that are
	    including or have included CME identifiers in their anti-virus and information
	    security products and services. Proland Software Includes CME Identifier in Virus Alert Proland Software issued a virus
	    alert on November 21, 2005 that referenced CME-681. See the Products and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products and services. CME Identifier Included in Article about Computer Worm on AXcess News CME was mentioned in a November 24, 2005 article on AXcess
	    News entitled "Computer
	    Worm Posing as Fake FBI E-Mail." CME is mentioned in the article
	    as one of the aliases assigned to the threat: "The Sober worm is also
	    known as CME-681, WORM_SOBER.AG [Trend Micro], W32/Sober-{X, Z} [Sophos],
	    Win32.Sober.W [Computer Associates], Sober.Y [F-Secure], W32/Sober@MM!M681
	    [McAfee], W32/Sober.AA@mm [Norman]." Details
	      about CME-681 and all CME identifiers
	      are available on the CME
	      List. CME Identifier Included in Article about Sober Worm on ZDNet News CME was mentioned in a November 23, 2005 article on ZDNet
	    News entitled "Latest
	    Sober threatens e-mail gateways." CME is mentioned as follows: "While
	    the worm variant is named differently by the security vendors, the Common
	    Malware Enumeration system, launched
	    last month, labels the new threat CME-681." Details about CME-681 and all CME identifiers are available on the CME
	    List. Back to top November 25, 2005 New CME Identifier Released: CME-681 CME-681 was assigned on November 22, 2005. Aliases for this threat include Win32.Sober.W; Sober.Y; Email-Worm.Win32.Sober.y; W32/Sober@MM!M681; W32/Sober.AA@mm; W32/Sober.AH.worm; W32/Sober-Z; W32.Sober.X@mm; and WORM_SOBER.AG. Visit the CME
	    List for a complete description of this and other CME identifiers. Notification of new CME identifiers is available from our RSS feed. Subscribe to the feed by clicking on the RSS or XML buttons located in the upper-right corner of the CME
	    List page. Back to top November 16, 2005 New CME Identifier Released: CME-157 CME-157 was assigned on November 15, 2005. Aliases for this threat include Email-Worm.Win32.Sober.u; W32/Sober.t.dr; W32.Sober.V@mm; W32/Sober-U; and Win32.Sober.Q. Visit the CME
	    List for a complete description of this and other CME identifiers. Notification of new CME identifiers is available from our RSS feed. Subscribe to the feed by clicking on the RSS or XML buttons located in the upper-right corner of the CME
	    List page. New CME Identifier Released: CME-589 CME-589 was assigned on November 10, 2005. Aliases for this threat include Win32.OutsBot.U; Breplibot.b; Backdoor.Win32.Breplibot.b; W32/Brepibot!CME-589; W32/Ryknos.A; Bck/Ryknos.A; Troj/Stinx-E; Backdoor.Ryknos; and BKDR_BREPLIBOT.C. Visit the CME
	    List for a complete description of this and other CME identifiers. Notification of new CME identifiers is available from our RSS feed. Subscribe to the feed by clicking on the RSS or XML buttons located in the upper-right corner of the CME
	    List page. CME Introduces Free Newsletter CME is now offering a free e-newsletter that you can receive directly in your email mailbox. "CME-Announce" will provide updates of new CME identifiers for breaking threats. The newsletter will also include general news about CME such as new Web site features, upcoming conferences, CME in the news, etc., depending on the issue. Messages with new CME identifiers will be sent as they occur, while messages focusing only on general news will be sent infrequently, once a week or less. Online sign-up is available on the Free
	    Newsletter page. View our Privacy
	    Policy. CME Mentioned in Article about New Worm on TechBuilder.org CME was mentioned in an October 6, 2005 article on TechBuilder.org entitled "New
	    Version of Sober Worm Slams Users." CME is mentioned as follows: "In a side note, the new Sober made history as the first piece of malicious code to be assigned a CME (Common Malware Enumeration) identifier as it hit the Internet: "CME-151." The CME identifying process is an attempt by US-CERT and private anti-virus vendors to reduce the confusion over the multiple names many worms and viruses receive." CME Main Topic of Article in DAWN Sci-Tech World CME was the main topic of a November 3, 2005 article in the Sci-Tech World section of DAWN, Pakistan's most widely circulated English language newspaper, entitled "Tips
	    and tricks: Worming it out." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, notes that CME is sponsored by US-CERT, mentions members of the CME
	    Editorial Board, discusses the role of the CME
	    Sample Redistribution Group, and provides a link to the CME Web site. The author states: "It is highly likely that members of the information security community will gradually adopt CME initiative to streamline the communication among themselves, the media and the public. As support with open source community catching up, CME has got strong academic uses as well. With Pakistan joining the net bandwagon, there's much emphasis on providing secure communication channels and use of CME will surely help professionals particularly those involved in vulnerability analysis." The article was written by Nizar Diamond Ali. CME and US-CERT are sponsored by the U.S
	    Department of Homeland Security. Launch of CME Main Topic of Article in Network Computing CME was the main topic of an October 6, 2005 article on Network
	    Computing's Systems Management Pipeline entitled "New
	    Worm Naming Scheme Aims To Cut Confusion." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, cites CME-151, notes that CME is sponsored by US-CERT, mentions members of the CME
	    Editorial Board, and provides a link to the CME Web site. The article also includes a quote about CME from Mark Harris, the director of CME Editorial Board member Sophos' research centers, who states: "[CME] will benefit customers in securing their computers from malware attack without disrupting rapid virus analysis." MITRE Hosts CME Booth at CSI 2005 MITRE hosted a CME/CVE/OVAL exhibitor booth at the 32nd annual CSI
	    Computer Security Conference & Exhibition, November 13-15, 2005, at the Marriott Wardman Hotel in Washington, D.C., USA. The conference exposed CME, CVE, and OVAL to information security and network professionals from industry, academia, and government. Common Vulnerabilities and Exposures (CVE) is a dictionary of common, standardized names for publicly known information security vulnerabilities and exposures. Open
	    Vulnerability and Assessment Language (OVAL) is a common language for security experts to discuss the technical details of how to identify the presence of vulnerabilities and configuration issues on computer systems using Community Forum-developed XML schemas and definitions. MITRE
	    Corporation maintains and manages the CVE, OVAL, and CME projects, all of which are funded by US-CERT at the U.S.
	    Department of Homeland Security. Visit the CME Calendar page for information about this and other upcoming events. Back to top October 28, 2005 CME List Now Available as an RSS Feed  The CME identifiers on
	  the CME List are now available
	  as an RSS feed. When new CME identifiers are assigned the information will
	  be published on the CME Web site and also distributed directly to subscribers
	  of the RSS feed. You may subscribe to the feed by clicking on the RSS or
	  XML buttons located in the upper-right corner of the CME
	  List page. New CME Editorial Board and Sample Redistribution Group Member Panda Software International S.L. has
	  joined the CME Editorial
	  Board and the CME Sample
	  Redistribution Group.  Sophos Plc.'s Virus Analyses Database Including CME-IDs as Aliases CME identifiers are included as aliases in Sophos
	    Plc.'s free Sophos
	    virus analyses database. CME-164 was
	    included as an alias for W32/Zotob-B.
	    Numerous other entries in the database also include CME-IDs. See the Products
	    and Services Including CME Identifiers page for a complete list of the
	    organizations that are including or have included CME identifiers in
	    their anti-virus and information security products and services. Sophos is a founding member of the CME
	Editorial Board and the CME
	Sample Redistribution Group. Fortinet Inc.'s Virus Encyclopedia Including CME-IDs as Aliases  CME identifiers are included as aliases in Fortinet
	    Inc.'s free Fortiguard
	    Center Virus Encyclopedia. CME-637 was
	    included as an alias for  W32/IRCBot.ET-bdr.
	    Numerous other entries in the encyclopedia also include CME-IDs. See
	    the Products
	    and Services Including CME Identifiers page for a complete list of the
	    organizations that are including or have included CME identifiers in
	    their anti-virus and information security products and services. F-Secure Corporation Includes CME Identifier in Virus Alert F-Secure
	    Corporation issued a virus
	    definition on October 6, 2005 that referenced CME-151.
	    See the Products
	    and Services Including CME Identifiers page for a complete list of the
	    organizations that are including or have included CME identifiers in
	    their anti-virus and information security products and services.   F-Secure is a founding member of the CME
	    Editorial Board and the CME
	    Sample Redistribution Group.  Norman ASA Includes CME Identifier in Virus Alert Norman ASA issued a virus
	    definition on October 6, 2005 that referenced CME-151.
	    See the Products
	    and Services Including CME Identifiers page for a complete list of the
	    organizations that are including or have included CME identifiers in
	    their anti-virus and information security products and services. Norman is
	      a founding member of the CME
	  Editorial Board and the CME
	  Sample Redistribution Group.  Cert-IST Includes CME Identifiers in Security Advisories  Cert-IST (Computer Emergency Response Team - Industry, Services
	  and Tertiary) issued a security
	  advisory on August 25, 2005 that referenced CME-243, CME-164,
	  and CME-15. Other Cert-IST
	  advisories also include CME identifiers. See the Products
	  and Services Including CME Identifiers page for a complete list of the
	  organizations that are including or have included CME identifiers in their
	  anti-virus and information security products and services. MITRE to Host CME Booth at 32nd Annual CSI Conference  MITRE is scheduled to host a CME/OVAL/CVE exhibitor booth at the 32nd annual  CSI
	      Computer Security Conference & Exhibition, November 13-15,
	      2005, at the Marriott Wardman Hotel in Washington, D.C., USA. The conference
	      will expose CME, OVAL, and CVE to information security and network professionals
	      from industry, academia, and government. Common Vulnerabilities and Exposures (CVE)
	    is a dictionary of common, standardized names for publicly known information
	    security vulnerabilities and exposures. Open
	    Vulnerability and Assessment Language (OVAL) is a common language for
	    security experts to discuss the technical details of how to identify
	    the presence of vulnerabilities and configuration issues on computer systems
	    using Community Forum-developed XML schemas and definitions. MITRE
	    Corporation maintains and manages the CVE, OVAL, and CME projects, all
	    of which are funded by US-CERT at
	    the U.S.
	    Department of Homeland Security. Visit the CME Calendar page for information
	      about this and other upcoming events. Norman ASA Press Release Announces Participation in CME and Inclusion of CME-IDs in their Virus Descriptions  Norman ASA issued a press release on
	  October 13, 2005 entitled "Norman
	  works for increased public understanding of IT security threats." The
	  release announces that Norman has joined the "Common Malware Enumeration
	  (CME), an international organisation that works for common definitions of
	  new virus threats in order to reduce public confusion during malware outbreaks." The
	  release describes what CME is and isn't and mentions the problems that
	  use of CME's common identifiers will solve.  In addition, the release states "Norman has already started using
	  the CME classification when analyzing [viruses]. This happened last week during
	  the outbreak of Sober." A url for a Norman virus
	  description that referenced CME-151 was
	  also provided. Norman is a founding member of the CME
	  Editorial Board and the CME
	  Sample Redistribution Group. CME and US-CERT are sponsored by the U.S
	  Department of Homeland Security.  McAfee, Inc. Press Release Announces Participation in CME Initiative McAfee, Inc. issued
	  a press release on October 5, 2005 entitled "McAfee,
	  Inc. Supports Common Malware Enumeration Initiative to Help Alleviate Problems
	  With Malware Naming." The release announces that McAfee has joined
	  the "CME Editorial Board to help bring the CME's concept to maturity
	  and to help expand its reach to other members of the anti-malware industry." The
	  release describes what CME is and isn't, notes that CME is sponsored
	  by US-CERT, and mentions the problems
	  that use of CME's common identifiers will solve.  The release also includes
	    a quote from Jimmy Kuo, research fellow for McAfee's Anti-Virus and Vulnerability
	    Emergency Response Team (AVERT), who states: "During
	    the outbreak process it can be difficult for anti-virus companies to stay
	    coordinated with virus names, and, as a result, threats are given a variety
	    of names and variant designations. This is even harder on IT administrators,
	    because their products may be alerting them to threats with completely
	    different names than what another security vendor may be calling them.
	    The CME initiative will help alleviate this problem with the use of identifiers,
	    so even if a name is slightly different between various vendors, the identifier
	    will match." McAfee is a founding member of the CME
	  Editorial Board and the CME
	  Sample Redistribution Group. CME and US-CERT are sponsored by the U.S
	  Department of Homeland Security.  Sophos Plc. Press Release Announces Appointment to CME Editorial Board and Inclusion of CME-IDs in the Sophos Virus Analyses Database  Sophos Plc. issued a press
	  release on October 5, 2005 entitled "Sophos
	  joins drive to cure virus-naming confusion." The release announces
	  that Sophos has joined the "editorial board for the Common Malware Enumeration
	  (CME) initiative, an industry group whose aim is to provide unique, common
	  identifiers to new malware threats." The release describes what
	    CME is and isn't, mentions the problems that use of CME's common
	    identifiers will solve, notes that CME is sponsored by US-CERT,
	    describes the role of the CME
	    Editorial Board, and includes a link to the CME Web site. The release
	    also states "For every virus identified by CME, Sophos will display
	    the CME reference in its extensive database
	    of virus analyses." Also included is a quote from Mark Harris,
	    director of SophosLabs, Sophos's network of virus and spam research centers,
	    who states: "We
	    encourage more anti-virus vendors to participate in this initiative,
	    which will benefit customers involved in securing their computers from
	    malware attack without disrupting the serious work of rapid virus analysis
	    and protection." Sophos
	      is a founding member of the CME
	      Editorial Board and the CME
	      Sample Redistribution Group. CME and US-CERT are sponsored by the U.S
	      Department of Homeland Security.  MITRE Hosts CME Booth at FIAC 2005  MITRE hosted a CME/OVAL/CVE exhibitor
	  booth at Federal Information Assurance
	  Conference (FIAC) 2005, October 25–26, 2005, at the University
	  of Maryland University College in Adelphi, Maryland, USA. The conference
	  exposed CME, OVAL, and CVE to network and systems administrators, security
	  practitioners, acquisition and procurement officials, systems security officers,
	  federal managers, accreditors, and certifiers from numerous agencies of the
	  U.S. federal government. Visit the CME Calendar page for information about
	    this and other upcoming events. Search Feature Added to CME Web Site  A Search the
	    CME Web Site feature has been added to the main menu of the CME Web
	    site to assist users. You may search the site by CME-ID or keyword(s). Back to top October 12, 2005 FrSIRT References CME Identifiers in Security Alerts French Security Incident Response
	    Team (FrSIRT) issued a security
	    alert on August 14, 2005 that referenced CME-243. Other FrSIRT alerts also include CME identifiers. See the Products
	    and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products, services, Web sites, alerts, encyclopedias, etc. MITRE to Host CME Booth at FIAC 2005 MITRE is scheduled to host a CME/OVAL/CVE exhibitor booth at Federal
	    Information Assurance Conference (FIAC) 2005, October 25-26, 2005, at the Inn and Conference Center, University of Maryland University College, in Adelphi, Maryland, USA. The conference will expose CVE, OVAL, and CME to network and systems administrators, security practitioners, acquisition and procurement officials, systems security officers, federal managers, accreditors, and certifiers from numerous agencies of the U.S. federal government. Common Vulnerabilities and Exposures (CVE) is a dictionary of common, standardized names for publicly known information security vulnerabilities and exposures. Open
	    Vulnerability and Assessment Language (OVAL) is a common language for security experts to discuss the technical details of how to identify the presence of vulnerabilities and configuration issues on computer systems using Community Forum-developed XML schemas and definitions. MITRE
	    Corporation maintains and manages the CVE, OVAL, and CME projects, all of which are funded by US-CERT at the U.S.
	    Department of Homeland Security. Visit the CME Calendar page for information about this and other upcoming events. 'Calendar of Events' Page Added to CME Web Site A Calendar of Events page
	  has been added to the News section of the CME
	  Web site. The calendar will note the conferences and other events at which
	  CME will be delivering presentations, participating on panel discussions,
	  exhibiting, etc. Each listing will include the event name with URL, date
	  of the event, location, and a description of our activity at the event. CME Presents Briefing and Hosts BoF at Virus
	    Bulletin Conference on October 5th MITRE presented a briefing about CME and hosted a Birds of a
	  Feather (BoF) meeting at the Virus
	    Bulletin Conference on October 5th, 2005, at The Burlington, in Dublin,
	    Ireland. The conference, which ran October 5th-7th, exposed CME to "dedicated
	    anti-virus researchers and security professionals from government and
	    military organizations, legal, financial and educational institutions,
	    and some of the world's largest international corporations." The briefing
	    and BoF both focused on the announcement about the public launch of the
	    CME initiative. CME Main Topic of Article in Information Week CME was the main topic of an October 6, 2005 article in Information
	    Week entitled "New
	    Worm Naming Scheme Aims To Cut Confusion" The article notes that CME is sponsored by US-CERT, describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, cites CME-151, and mentions several members of the CME
	    Editorial Board. The article also includes a quote about CME from Mark Harris, the director of CME Editorial Board member Sophos' research centers, who states: "[CME] will benefit customers in securing their computers from malware attack without disrupting rapid virus analysis." CME Main Focus of Article on CXOtoday.com CME was the main topic of an October 6, 2005 article on CXOtoday.com entitled "Leading
	    Vendors Adopt Common Virus Nomenclature." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, describes CME
	    identifiers, details the process for assigning
	    CME identifiers, notes that CME is sponsored by US-CERT, describes MITRE
	    Corporation and its role, lists the members of the CME
	    Editorial Board, and provides a link to the CME Web site. Launch of CME Main Topic of Article in Sans NewsBites CME was the main topic of a brief article entitled "Common
	    Malware Enumeration Initiative to be Launched in October" in the September 27, 2005 issue of SANS
	    NewsBites. The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, and notes that CME is sponsored by US-CERT. CME Main Topic of Article on All Headline News CME was the main topic of a September 27, 2005 article on All
	    Headline News entitled "Computer
	    Malware To Be Unveiled." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, and notes that CME is sponsored by US-CERT. CME Main Focus of Article on CNET.com CME was the main topic of a September 23, 2005 article on CNET.com entitled "This
	    week in security." The article mentions the problems that use of CME's common identifiers will solve and discusses some examples. Back to top October 5, 2005  MITRE Corporation Issues Press Release Announcing CME The MITRE
		Corporation issued a press release entitled "Common
		Malware Enumeration Initiative Now Available" on October 5, 2005 formally
		announcing the launch of the CME initiative. The release describes what
		CME is and isn't, discusses the CME
		Editorial Board, and mentions the address of the CME Web site.  A CME
		Press Q&A is also available. CME is sponsored by US-CERT at the U.S.
		Department of Homeland Security. MITRE maintains CME and provides neutral
		guidance to the CME Sample Redistribution Group and CME Editorial Board throughout the process to ensure that CME serves the
		public interest. CME to Present Briefing and Host BoF at Virus
		Bulletin Conference on October 5th MITRE is scheduled to present a briefing about CME and host a Birds of a Feather (BoF) meeting at the Virus
		Bulletin Conference on October 5th, 2005, at The Burlington, in Dublin, Ireland. The conference, which runs October 5th-7th, will expose CME to "dedicated anti-virus researchers to security professionals from government and military organizations, legal, financial and educational institutions, and some of the world's largest international corporations." The briefing and BoF will focus on the announcement about the public launch of the CME initiative. Article in Virus Bulletin Announces Public Launch of CME Initiative An article entitled "The
		Common Malware Enumeration Initiative" describing CME was published in the September 2005 issue of the Virus
		Bulletin. The article serves as the public launch of CME and describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, describes CME
		identifiers, details the process for assigning
		CME identifiers, lists the members of the CME
		Editorial Board, and advocates the adoption of CME by the anti-virus and information security communities for the benefit of the public. The article will also be presented as a briefing topic at the upcoming Virus
		Bulletin Conference on October 5th-7th, 2005 in Dublin, Ireland. CME Main Focus of Article on SearchSecurity.com CME was the main topic of a September 29, 2005 article on SearchSecurity.com entitled "Will
		US-CERT bring sanity to virus naming?" The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, notes that CME is sponsored by US-CERT, and mentions members of the CME
		Editorial Board. The article also includes a quote about the potential for CME from Lenny Zeltser, practice leader at New York-based Gemini Systems LLC and a volunteer handler for the Bethesda, Md.-based SANS Internet Storm Center, who states: "If CME lives up to its potential, security practitioners will save valuable time by relying on a single CME tag to identify a particular malicious program across multiple anti-virus databases." CME and US-CERT are sponsored by the U.S
		Department of Homeland Security. CME Main Topic of Article on CNET.com CME was the main topic of a September 22, 2005 article in CNET.com entitled "Name
		that wormplan looks to cut through chaos." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, cites CME-540 and
		describes the threat it refers to, provides an overview of how
		CME identifiers are assigned, notes that CME is sponsored by US-CERT, and
		describes the role of the CME Editorial
		Board and lists several of the organizations
		participating. The article also includes a quote from CME Team Member Desiree Beck describing how CME works: "A CME identifier should get assigned within hours of a new worm or virus starting to spread. Security vendors then should include the number in their products and link from their advisories to the information on the CME Web site, which is set to debut in early October. The proposal is for security companies to add the CME tag to the threat names. An alert popping up on a user's screen could [read] like this: "Zotob.E!CME-540 detected." CME and US-CERT are sponsored by the U.S
		Department of Homeland Security. Launch of CME Main Topic of Article in eWeek CME was the main topic of a September 22, 2005 article in eWeek entitled "US-CERT
		Malware Naming Plan Faces Obstacles." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, and lists several members of the CME
		Editorial Board. The article also includes a quote from MITRE CME Project Leader Julie Connolly who states: "MITRE has created a secure server to which participating anti-virus companies pass their discoveries, and will launch a CME Web site on [Oct. 5] that will list about [26] viruses with CME numbers. Initially, only high-impact viruses and worms will receive CME numbers, though MITRE may extend CME numbers to lower-level threats once the program is up and running. Back to top |