Industry News Coverage (2006 Archive)
Below is a comprehensive monthly review of the news and other media's coverage of CME. A brief summary of each news item is listed with its title, author (if identified), date, and media source.
June 2006
IEEE Distributed Systems Online, June 2006
CME was mentioned in an article about security standards
efforts entitled "Functionality
Meets Terminology to Address Network Security Vulnerabilities"
in the June 2006 issue of IEEE
Distributed Systems Online. The main focus of the article is the
success of the Common Vulnerabilities and Exposures (CVE)
standard and of the U.S. National Vulnerability Database (NVD),
which is built upon CVE identifiers.
CME is mentioned in a section entitled "New efforts round out
the landscape" as a follow-on standards effort that is attempting
to "standardize virus nomenclature" by providing single,
common identifiers to virus threats to reduce public confusions during
malware outbreaks and to facilitate the adoption of a shared, neutral
indexing capability for malware. The article concludes with a quote
by CVE Compatibility Program Lead Robert A. Martin who comments on the
purpose behind these other information security standards efforts: "People
are so used to selecting the vendor and that's kind of the core
they build out from. What we want them to do is get married to enabling
standards and then build around that."
The article was written by Gary Goth. CME, CVE, and NVD
are sponsored by the U.S
Department of Homeland Security.
Back to top
May 2006
Computer Knowledge, May 7, 2006
CME was mentioned in a May 7, 2006 article in the "Virus Tutorial" section of the Computer
Knowledge Web site entitled "Virus
Names." The main topic of the article is the assignment of virus names. CME is mentioned as follows: "A new site to try to correlate malware names: CME
- Common Malware Enumeration CME provides single, common identifiers to new virus threats to reduce public confusion during malware outbreaks. CME is not an attempt to solve the challenges involved with naming schemes for viruses and other forms of malware, but instead aims to facilitate the adoption of a shared, neutral indexing capability for malware."
PC Magazine, May 3, 2006
CME was mentioned in a May 3, 2006 article in PC
Magazine entitled "Name
That Virus." The main topic of the article is the assignment of virus names. CME is mentioned when the author states: "A recent system aims to cut through the confusion. The Common Malware Enumeration (CME) Project assigns a random identifier to major threats to help responders unify on a name. Rather than Blackmal, Nyxem, or KamaSutra, responders used CME-24 to talk about that virus." The article was written by Robert Lemos.
SecurityFocus, May 2, 2006
CME was mentioned in a May 2, 2006 article entitled "Malware
analysis reveals families of code" on SecurityFocus.com. The main focus of the article is a project by Sabre
Security to automate the process of "classifying malicious software," which found that of the "two major [malware code] families, the most distant relatives were 75 percent and 58 percent similar. If the latter cluster were divided, it could form two families that were at least 90 percent similar . . . " The study further found that "several threats identified by different names among antivirus vendors are, in fact, very similar."
CME is mentioned in the conclusion of the article when the author states: "The plethora of names for some high-profile viruses and malicious code has caused confusion in the past, though the Common Malware Enumeration project aims to assign IDs to a small number of threats to aid responders." The article is written by Robert Lemos.
Back to top
April 2006
InternetWeek, April 5, 2006
CME was mentioned in an April 5, 2006 article in InternetWeek entitled "Microsoft:
Our Bugs Aren't The Only Problem." The main focus of the article is how "Attacks that rely on "social engineering" tricks to fool users into visiting malicious Web sites are just as dangerous as any that exploit software vulnerabilities." CME is mentioned as an alias in a quote by Matt Braverman, a program manager with Microsoft's Anti-Malware Technology Team, when discussing the affects of the "MyWife.e worm (aka CME-24), which [Microsoft] removed from approximately 40,000 computers in February." Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by Gregg Keizer.
Back to top
March 2006
Arbor Networks Web Site, March 27, 2006
CME was the main topic of a March 27, 2006 news release from Arbor
Networks entitled "Arbor
Networks Joins MITRE's Common Malware Enumeration (CME) Editorial Board." The release describes what CME is, notes the main purpose of CME is to facilitate the adoption of a shared neutral indexing capability for malware, and describes the role of the CME
Editorial Board.
The release includes a quote from senior security engineer and worm researcher at Arbor Networks, Jose Nazario, who states: "Arbor Networks is excited to work with the anti-virus community, MITRE and US-CERT to address the many challenges in fighting malware threats today. CME will become a vital component of any timely, complete anti-malware solution, and we're proud to offer a unique, network-centric perspective to the board to help better define malware that threatens enterprise networks daily."
Arbor Networks is a member of the CME
Editorial Board and the CME Sample Redistribution
Group.
eWeek, March 10, 2006
CME was the main topic of a March 10, 2006 opinion column in eWeek entitled "CME
Malware Naming System Never Had a Chance." The article discusses some of the challenges CME has faced in the first six months of its launch, notes the main purpose of CME is to facilitate the adoption of a shared neutral indexing capability for malware, and mentions the extensive media coverage that used CME-24 as a shared index point for that threat. Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by Larry Seltzer.
eWeek, March 10, 2006
CME was the main topic of a March 10, 2006 opinion column in eWeek entitled "CME
Malware Naming System Never Had a Chance." The article discusses some of the challenges CME has faced in the first six months of its launch, notes the main purpose of CME is to facilitate the adoption of a shared neutral indexing capability for malware, and mentions the extensive media coverage that used CME-24 as a shared index point for that threat. Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by Larry Seltzer.
SecurityFocus, March 9, 2006
CME was the main topic of a March 9, 2006 article in SecurityFocus entitled "Virus
names likely a lost cause." The article notes the main purpose of CME as a shared neutral indexing capability for malware and discusses some of the challenges CME has faced since its launch in October 2005. The article also references CME-24 in a quote by CME Technical Lead Desiree Beck, who states: "In general, CME-24 was implemented very successfully--the majority of the antivirus companies were using it right away and it was picked up by various advisory organizations." Details about CME-24 and all CME identifiers are available on the CME
List. Symantec is the owner of SecurityFocus and is a founding member of the CME
Editorial Board and the CME Sample Redistribution
Group and is listed on the Products
and Services Including CME Identifiers page. The article was written by Robert Lemos.
SCMagazine, March 3, 2006
CME-24 was mentioned in a March 3, 2006 article in SCMagazine entitled "Worms
turn to top malware threat list." The article describes the threat and the potential damage it could cause and mentions CME-24 as one of the aliases. Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by William Eazel.
CAIDA Web Site, March 2, 2006
CME-24 was the main topic of a March 2, 2006 article on the Cooperative
Association for Internet Data Analysis (CAIDA) Web site entitled "The
Nyxem Email Virus: Analysis and Inferences." The article describes the threat, analyzes how it spread and where, and states that because of the coverage the issue received "Nyxem provided a relatively rare opportunity to get an in-depth look at the global spread of an otherwise mundane email virus." CME-24 is included as an alias for the threat. The CME
List is also used a source for aliases when the authors provide background information on the threat under discussion: "Virus Name: This virus has at least 17
names in active use." The article was written by David Moore and Colleen Shannon.
Secure Enterprise Magazine, March 1, 2006
CME-24 was the main topic of
a March 1, 2006 article in Secure Enterprise Magazine entitled "All
the Rage: Kama Sutra: More Hype Than Heat." The article describes the threat and the potential damage it could cause and mentions CME-24 as one of the aliases. Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by Joanne VanAuken.
Back to top
February 2006
WABC-AM Web Site, February 8, 2006
CME-24 was the main topic of a February 8, 2006 article on WABC-AM Web site entitled "Security
Researchers Worry That Variations on Computer Worm Moniker May Confuse Consumers." The
article describes the threat using CME-24 as its name and calling it the "official name" for the threat. The article also describes what CME is and isn't
and includes a link to the CME Web site. Details about CME-24 and all CME identifiers are available on the CME List.
PC Magazine, February 7, 2006
CME-24 was the main topic of a February 7, 2006 article on PC
Magazine entitled "Security
Watch: Blackworm Blows Up On Friday." The article rates anti-virus vendor
response times to the threat and mentions CME-24 as one of the aliases.
Details about CME-24 and all CME identifiers are available on the CME List.
Fox News, February 6, 2006
CME-24 was the main topic of a February 6, 2006 article on FoxNews.com entitled "File-Destroying
Computer Worm Fizzles Out." The article describes the threat using CME-24 as
its name and discusses the amount of damage it caused. Details about CME-24 and all CME identifiers are available on the CME List.
ZDNet Asia, February 6, 2006
CME-24 was the main topic of a February 6, 2006 article on ZDNet
Asia entitled "Kama
Sutra worm hype may bite back." The article describes the threat using
CME-24 as its name and discusses the amount of damage it caused. The article
was written by Joris Evers. Details about CME-24 and all CME identifiers are available on the CME List.
'24-Hour Technology News' Section of Sacramento Bee Web Site, February 4, 2006
CME-24 was the main topic of
a February 4, 2006 article on the '24-Hour
Technology News' section of the Sacramento
Bee newspaper Web site entitled "Computer
worm causes little damage." The article describes the threat using
CME-24 as its name and calling it the "official name" for the
threat. The article also discusses the amount of damage it caused. Details
about CME-24 and all CME identifiers are available on the CME
List. The article was written by Anick Jesdanun.
Washington Post, February 4, 2006
CME was the main topic of a February 4, 2006 "Security Fix" column on WashingtonPost.com entitled "Virus
Naming Still a Mess." The article mentions CME-24 and
describes the threat and the potential damage it could cause, and notes
many of its aliases. The article also describes what CME is and isn't, mentions
the problems that use of CME's common identifiers will solve, discusses
the challenges the initiative faces as a community initiative in assigning
identifiers, and provides a link to the CME Web site. The article was written
by Brian Krebs. Details about CME-24 and all CME identifiers are available on the CME List.
Comcast.net, February 3, 2006
CME-24 was the main topic of
a February 3, 2006 article on the 'Technology
News' section Comcast.net entitled "Researchers
Fear Confusion on Worm Name." The article describes the threat
using CME-24 as its name and calling it the "official name" for
the threat. The article also describes what CME is and isn't, notes that
the effort is sponsored by the U.S.
Department of Homeland Security, and provides a link to the CME Web
site. Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by Anick Jesdanun.
BBC News, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on BBCNews.com Web site entitled "'Limited'
damage from Nyxem virus." The article describes the threat using CME-24 as its name and discusses the amount of damage it caused. Details about CME-24 and all CME identifiers are available on the CME
List.
NEWSxPC.com, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on NEWSxPC.com entitled "As
Promised, Blackworm Strikes." The article describes the threat using CME-24 as its name and discusses the amount of damage it caused. Details about CME-24 and all CME identifiers are available on the CME
List.
News 14 Carolina Web Site, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on News
14 Carolina Web site entitled "Computer
worm causes little damage." The article describes the threat using CME-24 as its name and discusses the amount of damage it caused. Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by Glenn Belin.
AOL News, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on AOL
News Web site entitled "Worm
May Damage Files on Feb. 3rd." The article describes the threat and mentions CME-24 as one of the aliases. Details about CME-24 and all CME identifiers are available on the CME
List. The article was written by Anick Jesdanun.
Castle Cops Web Site, February 3, 2006
CME-24 was the main topic of a brief February 3, 2006 article on the Castle
Cops Web site entitled "Beware!:
CME-24 targets Feb 3rd Strike Date." The article describes the threat and mentions CME-24 as one of the aliases. Details about CME-24 and all CME identifiers are available on the CME
List.
Lexington Herald-Leader, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article in Kentucky's Lexington-Herald
Leader newspaper entitled "Worms'
many aliases can confuse consumers." The article describes the threat
using CME-24 as its name and calling it the "official name" for the threat. The article also describes what CME is and isn't
and notes that the effort includes a link to the CME Web site. Details about
CME-24 and all CME identifiers are available on the CME List.
CIO Today, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on CIO
Today entitled "Kama
Sutra Worm Not as Damaging as Expected." The article describes the threat
and mentions CME-24 as one of the aliases. Details about CME-24 and all CME identifiers are available on the CME List.
ZDNet Asia, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on ZDNet
Asia entitled "Kama
Sutra to be a painless affair?" The article describes the threat and
mentions CME-24 as one of the aliases. The article was written by Vivian
Yeo. Details about CME-24 and all CME identifiers are available on the CME List.
InternetNews.com, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article in a "Security" column on InternetNews.com entitled "As
Promised, Blackworm Strikes." Throughout the article the author uses
CME-24 to reference the threat and when discussing the potential damage
it could cause. The article was written by Sean Michael Kerner. Details
about CME-24 and all CME identifiers are available on the CME List.
MSNBC, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on MSNBC entitled "What's
in a virus name? A lot of confusion." The article describes the threat
using CME-24 as its name and calling it the "official name" for the threat. The article also describes what CME is and isn't, mentions that the CME Web site was launched in October, and notes that the effort is sponsored by the U.S.
Department of Homeland Security. Details about CME-24 and all CME identifiers are available on the CME List.
Yahoo News, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on Yahoo
News entitled "Researchers
Fear Confusion on Worm Name." The article describes the threat using
CME-24 as its name and calling it the "official name" for the threat. The article also describes what CME is and isn't, and notes that the effort is sponsored by the U.S.
Department of Homeland Security. The article was written by Anick Jesdanun.
Details about CME-24 and all CME identifiers are available on the CME List.
Turk.Internet.com, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on Turk.Internet.com entitled "ve..
Nyxem Vurdu.. Toplam 600.00 PC'yi." The article describes the threat
and mentions CME-24 as one of the aliases. The article was written by Sean
Michael Kerner. Details about CME-24 and all CME identifiers are available on the CME List.
WCCO TV Web Site, February 3, 2006
CME-24 was the main topic of a February 3, 2006 article on WCCO
TV Web site entitled "Hong
Kong Resists New Data Worm." The article describes the threat and the
potential damage it could cause to Asian financial markets and mentions
CME-24 as one of the aliases. Details about CME-24 and all CME identifiers are available on the CME List.
Yahoo News, February 2, 2006
CME-24 was the main topic of a February 2, 2006 article on Yahoo
News entitled "Researchers
Warn of File-Destroying Worm." The article describes the threat using
CME-24 as its name, notes the potential damage it could cause, and mentions
some other aliases. The article was written by Anick Jesdanun. Details about
CME-24 and all CME identifiers are available on the CME List.
Fox News, February 2, 2006
CME-24 was the main topic of a February 2, 2006 article on FoxNews.com entitled "Computer
Worm Threatens Major Destruction Friday." The article describes the
threat using CME-24 as its name, notes the potential damage it could cause,
and mentions some other aliases. Details about CME-24 and all CME identifiers are available on the CME List.
CNET News.com, February 2, 2006
CME-24 was the main topic of a February 2, 2006 article on CNET
News.com entitled "A
CNET FAQ on the Kama Sutra worm." The article describes the threat and
the potential damage it could cause and mentions CME-24 as one of the aliases.
The article was written by Robert Vamosi. Details about CME-24 and all CME identifiers are available on the CME List.
Le Monde, February 1, 2006
CME-24 was the main topic of a February 1, 2006 article in Le
Monde entitled "Le
virus CME-24 menace des centaines de milliers d'ordinateurs." The article,
written in French, describes the threat and the potential damage it could
cause, and mentions several aliases. The author also uses CME-24 throughout the article to reference the threat. The article was written by Stéphane
Foucart. A fee may be required to read this article. Details about CME-24 and all CME identifiers are available on the CME List.
Microsoft Certified Professional
Magazine Online, February 2006
CME was the main topic of a February 2006 "Security Watch" column on Microsoft
Certified Professional Magazine Online entitled "Opinion:
Overblown Malware Threats: The New Reality?" Throughout the article
the uses CME-24 to reference the threat, public reaction to it, and when discussing the potential damage it could cause. The article was written by Russ Cooper. Details about CME-24 and all CME identifiers are available on the CME List.
Back to top
January 2006
Boston Globe, January 31, 2006
CME was mentioned in a January 31, 2006 article in the Boston
Globe entitled "Researchers
warn of file-destroying worm." CME is mentioned in a quote by Mikko Hypponen, chief research officer for F-Secure Corporation, who states: The worm, known as "CME-24," "BlackWorm," "Mywife.E" or a number of other monikers, even tries to disable anti-virus software that is out of date." F-Secure is a member of the CME
Editorial Board and the CME Sample Redistribution
Group. The article was written by Anick Jesdanun. Details about CME-24 and all CME identifiers are available on the CME List.
SANS News Bites, January 31, 2006
CME-24 was mentioned at the first topic in the January 31, 2006 edition of the SANS
News Bites e-newsletter in a statement by SANS Institute director, and OVAL
Board member, Alan Paller: "The CME-24 worm is really as bad as the news stories make it out to be. SANS Internet Storm Center has records of more than 300,000 victims. If their ISPs don't let them know about the problem they will lose most of their key files. This may be a good chance to see whether the courts will find ISPs and other network owners liable for not protecting their customers when they knew in advance that the customers' data was at risk." CME-24 was also the main topic of a brief article in the issue entitled "UK
ISP Notifying Users Who May be Infected by CME 24." Details about CME-24 and all CME identifiers are available on the CME List.
BBC News, January 30, 2006
CME-24 was mentioned in a January 30, 2006 article on BBCNews.com entitled "Countdown
for Windows virus." The article describes the threat and the potential
damage it could cause and mentions CME-24 as one of the aliases. Details
about CME-24 and all CME identifiers are available on the CME List.
ZDNet.com, January 26, 2006
CME-24 was mentioned in a January 26, 2006 article on ZDNET.com entitled "Kama
Sutra prevention and cure." The article describes the threat and the
potential damage it could cause and mentions CME-24 as one of the aliases.
The article was written by Robert Vamosi. Details about CME-24 and all CME identifiers are available on the CME List.
Virus Bulletin, January 1, 2006
CME was mentioned in an article abstract entitled "Ally in our defences" on Virus Bulletin. CME is mentioned when the author states: "Two details we find valuable that are often missing from virus information are alias names and timestamps that reflect data changes. Providing alias names on all threats would allow the group that provides our monitoring service to correlate the information amongst vendors more easily. We are not suggesting that vendors provide every single alias name available, but provide at least a fair sampling. Of course having a Common Malware Enumeration (CME-ID) identifier for all threats would be the optimum situation. When vendors use a timestamp to reflect changes to their write-ups, we can peruse their sites more easily. Because we seek so much information, we need to be able to find new information quickly, without having to re-read the original details." This January 1, 2006 opinion article was written by Jeannette Jarvis of Boeing Company.
Back to top
|