Navy swabs decks clean of Welchia

By late last week, the Navy'the federal agency hardest hit by Welchia, the worm that mimicked MSBlaster'had nearly finished cleaning up from the virus fallout. Those few systems still infected have been identified mainly as portable PCs belonging to active-duty sailors and Navy reservists who were on vacation or leave over the past few weeks, a Navy spokeswoman said.

In restoring full service to the Navy-Marine Corps Intranet portal, the Navy installed antivirus fixes from Symantec Corp. of Cupertino, Calif., to rid the network of the Welchia worm. In cases where a user was on vacation while the worm choked Internet and e-mail access to more than 50,000 systems, 'they'll have to plug into the NMCI network and download the patch,' the spokeswoman said.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected