News & Events (2005 Archive)
December 20, 2005
CME List Enhanced with Links to Vendor Aliases
The CME List has been enhanced with links to vendor aliases for each CME identifier (CME-ID) included on the list. Users can now review a CME-ID and then follow the url for one or more of the vendor aliases to retrieve additional data about the threat and/or, depending on the vendor, fix information.
For example, in addition to a description of the malware and the date the identifier was assigned, the CME List entry for CME-681 now includes links for the following aliases:
Aliases on the CME Web site are provided by members of the CME Editorial Board and CME Sample Redistribution Group. Visit the CME List to review all CME-IDs and aliases.
CME to Host Booth at Homeland Security for Networked Industries 2006 Conference & Expo in January
MITRE is scheduled to host a CME/OVAL/CVE exhibitor
booth at Homeland Security
for Networked Industries (HSNI) 2006 Conference & Expo on January
9-11, 2006 at Walt Disney World Resort, in Orlando, Florida, USA. The conference
is "the first of its kind to encourage cross-industry collaboration on network
security issues pertinent to America's critical infrastructures [or those]
networks which serve as the backbone for daily life for the American public." It
is "an opportunity to listen and network with IT decision makers from a variety
of networked industries including utilities, telecom and transportation as
well as government."
Organizations listed on the Products and Services Including CME Identifiers page will also be exhibiting. Please stop by Booth 117, or any of these booths, and say hello.
Back to top
December 1, 2005
Trend Micro, Inc. Includes CME Identifiers in Virus Encyclopedia and Alerts
Trend Micro, Inc. issued a virus
alert on November 21, 2005 that referenced CME-681. Numerous other alerts in the Trend
Micro Virus Encyclopedia also reference CME identifiers. See the Products
and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products and services.
Trend Micro is a founding member of the CME
Editorial Board and the CME Sample Redistribution
Group.
Panda Software International S.L.'s Virus Encyclopedia Including CME-IDs as Aliases
CME identifiers are included as aliases in Panda
Software International S.L.'s free Virus
Encyclopedia. CME-681 was included as an alias for the W32/Sober.AH.worm. Numerous other entries in the encyclopedia also include CME-IDs. See the Products and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products and services.
Panda Software is a member of the CME
Editorial Board and the CME Sample Redistribution
Group.
Hong Kong CERT Includes CME Identifier in Virus Alert
Hong
Kong CERT issued a virus
alert on November 23, 2005 that referenced CME-681.
See the Products and Services Including
CME Identifiers page for a complete list of the organizations that are
including or have included CME identifiers in their anti-virus and information
security products and services.
Counterpane Internet Security, Inc. Includes CME Identifier in Virus Alert
Counterpane
Internet Security, Inc. issued a virus alert on November 22, 2005 entitled "CME
681 - Sober Virus Spoofing FBI and CIA" that referenced CME-681.
See the Products and Services Including
CME Identifiers page for a complete list of the organizations that are
including or have included CME identifiers in their anti-virus and information
security products and services.
Proland Software Includes CME Identifier in Virus Alert
Proland Software issued a virus
alert on November 21, 2005 that referenced CME-681. See the Products and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products and services.
CME Identifier Included in Article about Computer Worm on AXcess News
CME was mentioned in a November 24, 2005 article on AXcess
News entitled "Computer
Worm Posing as Fake FBI E-Mail." CME is mentioned in the article
as one of the aliases assigned to the threat: "The Sober worm is also
known as CME-681, WORM_SOBER.AG [Trend Micro], W32/Sober-{X, Z} [Sophos],
Win32.Sober.W [Computer Associates], Sober.Y [F-Secure], W32/Sober@MM!M681
[McAfee], W32/Sober.AA@mm [Norman]."
Details
about CME-681 and all CME identifiers
are available on the CME
List.
CME Identifier Included in Article about Sober Worm on ZDNet News
CME was mentioned in a November 23, 2005 article on ZDNet
News entitled "Latest
Sober threatens e-mail gateways." CME is mentioned as follows: "While
the worm variant is named differently by the security vendors, the Common
Malware Enumeration system, launched
last month, labels the new threat CME-681."
Details about CME-681 and all CME identifiers are available on the CME
List.
Back to top
November 25, 2005
New CME Identifier Released: CME-681
CME-681 was assigned on November 22, 2005. Aliases for this threat include Win32.Sober.W; Sober.Y; Email-Worm.Win32.Sober.y; W32/Sober@MM!M681; W32/Sober.AA@mm; W32/Sober.AH.worm; W32/Sober-Z; W32.Sober.X@mm; and WORM_SOBER.AG. Visit the CME
List for a complete description of this and other CME identifiers.
Notification of new CME identifiers is available from our RSS feed. Subscribe to the feed by clicking on the RSS or XML buttons located in the upper-right corner of the CME
List page.
Back to top
November 16, 2005
New CME Identifier Released: CME-157
CME-157 was assigned on November 15, 2005. Aliases for this threat include Email-Worm.Win32.Sober.u; W32/Sober.t.dr; W32.Sober.V@mm; W32/Sober-U; and Win32.Sober.Q. Visit the CME
List for a complete description of this and other CME identifiers.
Notification of new CME identifiers is available from our RSS feed. Subscribe to the feed by clicking on the RSS or XML buttons located in the upper-right corner of the CME
List page.
New CME Identifier Released: CME-589
CME-589 was assigned on November 10, 2005. Aliases for this threat include Win32.OutsBot.U; Breplibot.b; Backdoor.Win32.Breplibot.b; W32/Brepibot!CME-589; W32/Ryknos.A; Bck/Ryknos.A; Troj/Stinx-E; Backdoor.Ryknos; and BKDR_BREPLIBOT.C. Visit the CME
List for a complete description of this and other CME identifiers.
Notification of new CME identifiers is available from our RSS feed. Subscribe to the feed by clicking on the RSS or XML buttons located in the upper-right corner of the CME
List page.
CME Introduces Free Newsletter
CME is now offering a free e-newsletter that you can receive directly in your email mailbox. "CME-Announce" will provide updates of new CME identifiers for breaking threats. The newsletter will also include general news about CME such as new Web site features, upcoming conferences, CME in the news, etc., depending on the issue.
Messages with new CME identifiers will be sent as they occur, while messages focusing only on general news will be sent infrequently, once a week or less. Online sign-up is available on the Free
Newsletter page. View our Privacy
Policy.
CME Mentioned in Article about New Worm on TechBuilder.org
CME was mentioned in an October 6, 2005 article on TechBuilder.org entitled "New
Version of Sober Worm Slams Users." CME is mentioned as follows: "In a side note, the new Sober made history as the first piece of malicious code to be assigned a CME (Common Malware Enumeration) identifier as it hit the Internet: "CME-151." The CME identifying process is an attempt by US-CERT and private anti-virus vendors to reduce the confusion over the multiple names many worms and viruses receive."
CME Main Topic of Article in DAWN Sci-Tech World
CME was the main topic of a November 3, 2005 article in the Sci-Tech World section of DAWN, Pakistan's most widely circulated English language newspaper, entitled "Tips
and tricks: Worming it out." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, notes that CME is sponsored by US-CERT, mentions members of the CME
Editorial Board, discusses the role of the CME
Sample Redistribution Group, and provides a link to the CME Web site.
The author states: "It is highly likely that members of the information security community will gradually adopt CME initiative to streamline the communication among themselves, the media and the public. As support with open source community catching up, CME has got strong academic uses as well. With Pakistan joining the net bandwagon, there's much emphasis on providing secure communication channels and use of CME will surely help professionals particularly those involved in vulnerability analysis."
The article was written by Nizar Diamond Ali. CME and US-CERT are sponsored by the U.S
Department of Homeland Security.
Launch of CME Main Topic of Article in Network Computing
CME was the main topic of an October 6, 2005 article on Network
Computing's Systems Management Pipeline entitled "New
Worm Naming Scheme Aims To Cut Confusion." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, cites CME-151, notes that CME is sponsored by US-CERT, mentions members of the CME
Editorial Board, and provides a link to the CME Web site. The article also includes a quote about CME from Mark Harris, the director of CME Editorial Board member Sophos' research centers, who states: "[CME] will benefit customers in securing their computers from malware attack without disrupting rapid virus analysis."
MITRE Hosts CME Booth at CSI 2005
MITRE hosted a CME/CVE/OVAL exhibitor booth at the 32nd annual CSI
Computer Security Conference & Exhibition, November 13-15, 2005, at the Marriott Wardman Hotel in Washington, D.C., USA. The conference exposed CME, CVE, and OVAL to information security and network professionals from industry, academia, and government.
Common Vulnerabilities and Exposures (CVE) is a dictionary of common, standardized names for publicly known information security vulnerabilities and exposures. Open
Vulnerability and Assessment Language (OVAL) is a common language for security experts to discuss the technical details of how to identify the presence of vulnerabilities and configuration issues on computer systems using Community Forum-developed XML schemas and definitions. MITRE
Corporation maintains and manages the CVE, OVAL, and CME projects, all of which are funded by US-CERT at the U.S.
Department of Homeland Security.
Visit the CME Calendar page for information about this and other upcoming events.
Back to top
October 28, 2005
CME List Now Available as an RSS Feed
The CME identifiers on
the CME List are now available
as an RSS feed. When new CME identifiers are assigned the information will
be published on the CME Web site and also distributed directly to subscribers
of the RSS feed. You may subscribe to the feed by clicking on the RSS or
XML buttons located in the upper-right corner of the CME
List page.
New CME Editorial Board and Sample Redistribution Group Member
Panda Software International S.L. has
joined the CME Editorial
Board and the CME Sample
Redistribution Group.
Sophos Plc.'s Virus Analyses Database Including CME-IDs as Aliases
CME identifiers are included as aliases in Sophos
Plc.'s free Sophos
virus analyses database. CME-164 was
included as an alias for W32/Zotob-B.
Numerous other entries in the database also include CME-IDs. See the Products
and Services Including CME Identifiers page for a complete list of the
organizations that are including or have included CME identifiers in
their anti-virus and information security products and services.
Sophos is a founding member of the CME
Editorial Board and the CME
Sample Redistribution Group.
Fortinet Inc.'s Virus Encyclopedia Including CME-IDs as Aliases
CME identifiers are included as aliases in Fortinet
Inc.'s free Fortiguard
Center Virus Encyclopedia. CME-637 was
included as an alias for W32/IRCBot.ET-bdr.
Numerous other entries in the encyclopedia also include CME-IDs. See
the Products
and Services Including CME Identifiers page for a complete list of the
organizations that are including or have included CME identifiers in
their anti-virus and information security products and services.
F-Secure Corporation Includes CME Identifier in Virus Alert
F-Secure
Corporation issued a virus
definition on October 6, 2005 that referenced CME-151.
See the Products
and Services Including CME Identifiers page for a complete list of the
organizations that are including or have included CME identifiers in
their anti-virus and information security products and services.
F-Secure is a founding member of the CME
Editorial Board and the CME
Sample Redistribution Group.
Norman ASA Includes CME Identifier in Virus Alert
Norman ASA issued a virus
definition on October 6, 2005 that referenced CME-151.
See the Products
and Services Including CME Identifiers page for a complete list of the
organizations that are including or have included CME identifiers in
their anti-virus and information security products and services.
Norman is
a founding member of the CME
Editorial Board and the CME
Sample Redistribution Group.
Cert-IST Includes CME Identifiers in Security Advisories
Cert-IST (Computer Emergency Response Team - Industry, Services
and Tertiary) issued a security
advisory on August 25, 2005 that referenced CME-243, CME-164,
and CME-15. Other Cert-IST
advisories also include CME identifiers. See the Products
and Services Including CME Identifiers page for a complete list of the
organizations that are including or have included CME identifiers in their
anti-virus and information security products and services.
MITRE to Host CME Booth at 32nd Annual CSI Conference
MITRE is scheduled to host a CME/OVAL/CVE exhibitor booth at the 32nd annual CSI
Computer Security Conference & Exhibition, November 13-15,
2005, at the Marriott Wardman Hotel in Washington, D.C., USA. The conference
will expose CME, OVAL, and CVE to information security and network professionals
from industry, academia, and government.
Common Vulnerabilities and Exposures (CVE)
is a dictionary of common, standardized names for publicly known information
security vulnerabilities and exposures. Open
Vulnerability and Assessment Language (OVAL) is a common language for
security experts to discuss the technical details of how to identify
the presence of vulnerabilities and configuration issues on computer systems
using Community Forum-developed XML schemas and definitions. MITRE
Corporation maintains and manages the CVE, OVAL, and CME projects, all
of which are funded by US-CERT at
the U.S.
Department of Homeland Security.
Visit the CME Calendar page for information
about this and other upcoming events.
Norman ASA Press Release Announces Participation in CME and Inclusion of CME-IDs in their Virus Descriptions
Norman ASA issued a press release on
October 13, 2005 entitled "Norman
works for increased public understanding of IT security threats." The
release announces that Norman has joined the "Common Malware Enumeration
(CME), an international organisation that works for common definitions of
new virus threats in order to reduce public confusion during malware outbreaks." The
release describes what CME is and isn't and mentions the problems that
use of CME's common identifiers will solve.
In addition, the release states "Norman has already started using
the CME classification when analyzing [viruses]. This happened last week during
the outbreak of Sober." A url for a Norman virus
description that referenced CME-151 was
also provided.
Norman is a founding member of the CME
Editorial Board and the CME
Sample Redistribution Group. CME and US-CERT are sponsored by the U.S
Department of Homeland Security.
McAfee, Inc. Press Release Announces Participation in CME Initiative
McAfee, Inc. issued
a press release on October 5, 2005 entitled "McAfee,
Inc. Supports Common Malware Enumeration Initiative to Help Alleviate Problems
With Malware Naming." The release announces that McAfee has joined
the "CME Editorial Board to help bring the CME's concept to maturity
and to help expand its reach to other members of the anti-malware industry." The
release describes what CME is and isn't, notes that CME is sponsored
by US-CERT, and mentions the problems
that use of CME's common identifiers will solve.
The release also includes
a quote from Jimmy Kuo, research fellow for McAfee's Anti-Virus and Vulnerability
Emergency Response Team (AVERT), who states: "During
the outbreak process it can be difficult for anti-virus companies to stay
coordinated with virus names, and, as a result, threats are given a variety
of names and variant designations. This is even harder on IT administrators,
because their products may be alerting them to threats with completely
different names than what another security vendor may be calling them.
The CME initiative will help alleviate this problem with the use of identifiers,
so even if a name is slightly different between various vendors, the identifier
will match."
McAfee is a founding member of the CME
Editorial Board and the CME
Sample Redistribution Group. CME and US-CERT are sponsored by the U.S
Department of Homeland Security.
Sophos Plc. Press Release Announces Appointment to CME Editorial Board and Inclusion of CME-IDs in the Sophos Virus Analyses Database
Sophos Plc. issued a press
release on October 5, 2005 entitled "Sophos
joins drive to cure virus-naming confusion." The release announces
that Sophos has joined the "editorial board for the Common Malware Enumeration
(CME) initiative, an industry group whose aim is to provide unique, common
identifiers to new malware threats."
The release describes what
CME is and isn't, mentions the problems that use of CME's common
identifiers will solve, notes that CME is sponsored by US-CERT,
describes the role of the CME
Editorial Board, and includes a link to the CME Web site. The release
also states "For every virus identified by CME, Sophos will display
the CME reference in its extensive database
of virus analyses." Also included is a quote from Mark Harris,
director of SophosLabs, Sophos's network of virus and spam research centers,
who states: "We
encourage more anti-virus vendors to participate in this initiative,
which will benefit customers involved in securing their computers from
malware attack without disrupting the serious work of rapid virus analysis
and protection."
Sophos
is a founding member of the CME
Editorial Board and the CME
Sample Redistribution Group. CME and US-CERT are sponsored by the U.S
Department of Homeland Security.
MITRE Hosts CME Booth at FIAC 2005
MITRE hosted a CME/OVAL/CVE exhibitor
booth at Federal Information Assurance
Conference (FIAC) 2005, October 25–26, 2005, at the University
of Maryland University College in Adelphi, Maryland, USA. The conference
exposed CME, OVAL, and CVE to network and systems administrators, security
practitioners, acquisition and procurement officials, systems security officers,
federal managers, accreditors, and certifiers from numerous agencies of the
U.S. federal government.
Visit the CME Calendar page for information about
this and other upcoming events.
Search Feature Added to CME Web Site
A Search the
CME Web Site feature has been added to the main menu of the CME Web
site to assist users. You may search the site by CME-ID or keyword(s).
Back to top
October 12, 2005
FrSIRT References CME Identifiers in Security Alerts
French Security Incident Response
Team (FrSIRT) issued a security
alert on August 14, 2005 that referenced CME-243. Other FrSIRT alerts also include CME identifiers. See the Products
and Services Including CME Identifiers page for a complete list of the organizations that are including or have included CME identifiers in their anti-virus and information security products, services, Web sites, alerts, encyclopedias, etc.
MITRE to Host CME Booth at FIAC 2005
MITRE is scheduled to host a CME/OVAL/CVE exhibitor booth at Federal
Information Assurance Conference (FIAC) 2005, October 25-26, 2005, at the Inn and Conference Center, University of Maryland University College, in Adelphi, Maryland, USA. The conference will expose CVE, OVAL, and CME to network and systems administrators, security practitioners, acquisition and procurement officials, systems security officers, federal managers, accreditors, and certifiers from numerous agencies of the U.S. federal government.
Common Vulnerabilities and Exposures (CVE) is a dictionary of common, standardized names for publicly known information security vulnerabilities and exposures. Open
Vulnerability and Assessment Language (OVAL) is a common language for security experts to discuss the technical details of how to identify the presence of vulnerabilities and configuration issues on computer systems using Community Forum-developed XML schemas and definitions. MITRE
Corporation maintains and manages the CVE, OVAL, and CME projects, all of which are funded by US-CERT at the U.S.
Department of Homeland Security.
Visit the CME Calendar page for information about this and other upcoming events.
'Calendar of Events' Page Added to CME Web Site
A Calendar of Events page
has been added to the News section of the CME
Web site. The calendar will note the conferences and other events at which
CME will be delivering presentations, participating on panel discussions,
exhibiting, etc. Each listing will include the event name with URL, date
of the event, location, and a description of our activity at the event.
CME Presents Briefing and Hosts BoF at Virus
Bulletin Conference on October 5th
MITRE presented a briefing about CME and hosted a Birds of a
Feather (BoF) meeting at the Virus
Bulletin Conference on October 5th, 2005, at The Burlington, in Dublin,
Ireland. The conference, which ran October 5th-7th, exposed CME to "dedicated
anti-virus researchers and security professionals from government and
military organizations, legal, financial and educational institutions,
and some of the world's largest international corporations." The briefing
and BoF both focused on the announcement about the public launch of the
CME initiative.
CME Main Topic of Article in Information Week
CME was the main topic of an October 6, 2005 article in Information
Week entitled "New
Worm Naming Scheme Aims To Cut Confusion" The article notes that CME is sponsored by US-CERT, describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, cites CME-151, and mentions several members of the CME
Editorial Board. The article also includes a quote about CME from Mark Harris, the director of CME Editorial Board member Sophos' research centers, who states: "[CME] will benefit customers in securing their computers from malware attack without disrupting rapid virus analysis."
CME Main Focus of Article on CXOtoday.com
CME was the main topic of an October 6, 2005 article on CXOtoday.com entitled "Leading
Vendors Adopt Common Virus Nomenclature." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, describes CME
identifiers, details the process for assigning
CME identifiers, notes that CME is sponsored by US-CERT, describes MITRE
Corporation and its role, lists the members of the CME
Editorial Board, and provides a link to the CME Web site.
Launch of CME Main Topic of Article in Sans NewsBites
CME was the main topic of a brief article entitled "Common
Malware Enumeration Initiative to be Launched in October" in the September 27, 2005 issue of SANS
NewsBites. The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, and notes that CME is sponsored by US-CERT.
CME Main Topic of Article on All Headline News
CME was the main topic of a September 27, 2005 article on All
Headline News entitled "Computer
Malware To Be Unveiled." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, and notes that CME is sponsored by US-CERT.
CME Main Focus of Article on CNET.com
CME was the main topic of a September 23, 2005 article on CNET.com entitled "This
week in security." The article mentions the problems that use of CME's common identifiers will solve and discusses some examples.
Back to top
October 5, 2005
MITRE Corporation Issues Press Release Announcing CME
The MITRE
Corporation issued a press release entitled "Common
Malware Enumeration Initiative Now Available" on October 5, 2005 formally
announcing the launch of the CME initiative. The release describes what
CME is and isn't, discusses the CME
Editorial Board, and mentions the address of the CME Web site. A CME
Press Q&A is also available.
CME is sponsored by US-CERT at the U.S.
Department of Homeland Security. MITRE maintains CME and provides neutral
guidance to the CME Sample Redistribution Group and CME Editorial Board throughout the process to ensure that CME serves the
public interest.
CME to Present Briefing and Host BoF at Virus
Bulletin Conference on October 5th
MITRE is scheduled to present a briefing about CME and host a Birds of a Feather (BoF) meeting at the Virus
Bulletin Conference on October 5th, 2005, at The Burlington, in Dublin, Ireland. The conference, which runs October 5th-7th, will expose CME to "dedicated anti-virus researchers to security professionals from government and military organizations, legal, financial and educational institutions, and some of the world's largest international corporations." The briefing and BoF will focus on the announcement about the public launch of the CME initiative.
Article in Virus Bulletin Announces Public Launch of CME Initiative
An article entitled "The
Common Malware Enumeration Initiative" describing CME was published in the September 2005 issue of the Virus
Bulletin. The article serves as the public launch of CME and describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, describes CME
identifiers, details the process for assigning
CME identifiers, lists the members of the CME
Editorial Board, and advocates the adoption of CME by the anti-virus and information security communities for the benefit of the public. The article will also be presented as a briefing topic at the upcoming Virus
Bulletin Conference on October 5th-7th, 2005 in Dublin, Ireland.
CME Main Focus of Article on SearchSecurity.com
CME was the main topic of a September 29, 2005 article on SearchSecurity.com entitled "Will
US-CERT bring sanity to virus naming?" The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, notes that CME is sponsored by US-CERT, and mentions members of the CME
Editorial Board. The article also includes a quote about the potential for CME from Lenny Zeltser, practice leader at New York-based Gemini Systems LLC and a volunteer handler for the Bethesda, Md.-based SANS Internet Storm Center, who states: "If CME lives up to its potential, security practitioners will save valuable time by relying on a single CME tag to identify a particular malicious program across multiple anti-virus databases." CME and US-CERT are sponsored by the U.S
Department of Homeland Security.
CME Main Topic of Article on CNET.com
CME was the main topic of a September 22, 2005 article in CNET.com entitled "Name
that wormplan looks to cut through chaos." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, cites CME-540 and
describes the threat it refers to, provides an overview of how
CME identifiers are assigned, notes that CME is sponsored by US-CERT, and
describes the role of the CME Editorial
Board and lists several of the organizations
participating.
The article also includes a quote from CME Team Member Desiree Beck describing how CME works: "A CME identifier should get assigned within hours of a new worm or virus starting to spread. Security vendors then should include the number in their products and link from their advisories to the information on the CME Web site, which is set to debut in early October. The proposal is for security companies to add the CME tag to the threat names. An alert popping up on a user's screen could [read] like this: "Zotob.E!CME-540 detected."
CME and US-CERT are sponsored by the U.S
Department of Homeland Security.
Launch of CME Main Topic of Article in eWeek
CME was the main topic of a September 22, 2005 article in eWeek entitled "US-CERT
Malware Naming Plan Faces Obstacles." The article describes what CME is and isn't, mentions the problems that use of CME's common identifiers will solve, and lists several members of the CME
Editorial Board. The article also includes a quote from MITRE CME Project Leader Julie Connolly who states: "MITRE has created a secure server to which participating anti-virus companies pass their discoveries, and will launch a CME Web site on [Oct. 5] that will list about [26] viruses with CME numbers. Initially, only high-impact viruses and worms will receive CME numbers, though MITRE may extend CME numbers to lower-level threats once the program is up and running.
Back to top
|