Linked by Thom Holwerda on Tue 14th Apr 2009 15:19 UTC
Windows The Conficker worm, which spreads by infecting Windows computers who are not properly kept up-to-date, was supposed to make a big splash on April 1, but that day passed with a deafening silence on the Conficker front. Since then, there has been some movement by the worm, and data gathered from enterprise users of Sophos' Endpoint Assessment Test indicates that 10% of Windows machines have still not been properly patched, leaving them wide open to a Conficker infection.
Permalink for comment 358553
To read all comments associated with this story, please click here.
RE[2]: Comment by kaiwai
by Jon Dough on Tue 14th Apr 2009 21:55 UTC in reply to "RE: Comment by kaiwai"
Jon Dough
Member since:
2005-11-30

This sort of upgrades, critical upgrades, should be automatic and without user intervention. In other words, it should be pushed down the throat (at least after certain period of testing).


Only if the machine is configured to automatically set a restore point before the update is installed. I've seen way too many updates hose an OS to let it automatically install without a restore point.

Reply Parent Score: 3