Home Database Mysql Tutorial 上班后先杀毒:谨防利用ACCESS漏洞的木马

上班后先杀毒:谨防利用ACCESS漏洞的木马

Jun 07, 2016 pm 03:15 PM
access work use Antivirus loopholes Finish

长假结束,上班打开电脑后的第一件事应先给电脑全盘杀毒。10月7日,北京江民新科技术有限公司发布病毒警报,一种利用微软ACCESS JET漏洞的木马病毒正在国外流传,由于该病毒首次被发现时正值我国“十一”长假,因此目前在我国尚没有发现电脑被感染案例。但专

长假结束,上班打开电脑后的第一件事应先给电脑全盘杀毒。10月7日,北京江民新科技术有限公司发布病毒警报,一种利用微软ACCESS JET漏洞的木马病毒正在国外流传,由于该病毒首次被发现时正值我国“十一”长假,因此目前在我国尚没有发现电脑被感染案例。但专家提醒,不排除长假后病毒集中发作的可能性,由于该病毒主要攻击微软ACCESS漏洞,因此安装ACCESS数据库的小企业用户可能会成为病毒首先攻击的目标。

据介绍,该病毒伪装成微软数据库文件.mdb格式传播,传播的途径可能有邮件、即时通讯软件,以及恶意网页。一旦用户运行染有该病毒的.mdb文件,木马就会被激活,黑客利用该病毒可以入侵系统,进行各种恶意操作。

微软公司相关人员透露,木马病毒利用的该漏洞尚没有补丁发布,并提醒用户在打开不明来源的.mdb文件时要特别小心。

江民反病毒专家介绍,受该病毒影响的操作系统包括微软的全系列操作系统,存在漏洞的微软数据库软件包括Microsoft Access 2000/2002/2003/2003 Professional Edition/ Small Business Edition/2003 Standard Edition。

针对该病毒,江民反病毒专家提醒,上班后电脑用户应首先升级杀毒软件,对电脑进行全盘杀毒。此外,江民反病毒专家还提醒用户,虽然今年国庆期间没有发现病毒集中发作的迹象,但用户仍然不能放松警惕,尤其是长假后上班第一天,要收取大量的电子邮件,以及接受即时聊天工具上众多好友的问候,这时应格外注意,不要随意点击运行不明文件以及不明链,谨防感染病毒。
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to convert deepseek pdf How to convert deepseek pdf Feb 19, 2025 pm 05:24 PM

DeepSeek cannot convert files directly to PDF. Depending on the file type, you can use different methods: Common documents (Word, Excel, PowerPoint): Use Microsoft Office, LibreOffice and other software to export as PDF. Image: Save as PDF using image viewer or image processing software. Web pages: Use the browser's "Print into PDF" function or the dedicated web page to PDF tool. Uncommon formats: Find the right converter and convert it to PDF. It is crucial to choose the right tools and develop a plan based on the actual situation.

How to read dbf file in oracle How to read dbf file in oracle May 10, 2024 am 01:27 AM

Oracle can read dbf files through the following steps: create an external table and reference the dbf file; query the external table to retrieve data; import the data into the Oracle table.

Lenovo has issued a patch in May, Phoenix UEFI firmware vulnerability disclosed: affecting hundreds of Intel PC CPU models Lenovo has issued a patch in May, Phoenix UEFI firmware vulnerability disclosed: affecting hundreds of Intel PC CPU models Jun 22, 2024 am 10:27 AM

According to news from this site on June 21, the Phoenix Secure Core UEFI firmware was exposed to a security vulnerability, affecting hundreds of Intel CPU devices. Lenovo has released a new firmware update to fix the vulnerability. This site learned from reports that the vulnerability tracking number is CVE-2024-0762, known as "UEFICANHAZBUFFEROVERFLOW", which exists in the Trusted Platform Module (TPM) configuration of Phoenix UEFI firmware. It is a buffer overflow vulnerability that can be Exploit to execute arbitrary code on a vulnerable device. The vulnerability was discovered by Eclypsium in Lenovo ThinkPad X1 Carbon 7th generation and X1Yoga 4th generation

How to solve the problem of third-party interface returning 403 in Node.js environment? How to solve the problem of third-party interface returning 403 in Node.js environment? Mar 31, 2025 pm 11:27 PM

Solve the problem of third-party interface returning 403 in Node.js environment. When we use Node.js to call third-party interfaces, we sometimes encounter an error of 403 from the interface returning 403...

Laravel Redis connection sharing: Why does the select method affect other connections? Laravel Redis connection sharing: Why does the select method affect other connections? Apr 01, 2025 am 07:45 AM

The impact of sharing of Redis connections in Laravel framework and select methods When using Laravel framework and Redis, developers may encounter a problem: through configuration...

Hack an assassin's phone in 40 minutes Hack an assassin's phone in 40 minutes Jul 20, 2024 pm 06:11 PM

According to people familiar with the matter, Cellebrite, an Israeli mobile device forensics company, provided the FBI with an evaluation version of a mobile phone cracking program that has not yet been released and is still undergoing internal testing. The FBI used it to unlock the special device in less than 40 minutes. The cellphone of Trump assassin Thomas Matthew Crooks. Agents from the FBI's Pittsburgh office initially used a commercially available Cellebrite tool to unlock Crooks' phone, but were unsuccessful. So the phone was sent to the FBI's Quantico headquarters that day. After headquarters personnel contacted key account support, Cellebrite provided an unreleased unlocking tool, allowing investigators to unlock the phone at 40

What are the benefits of multithreading in c#? What are the benefits of multithreading in c#? Apr 03, 2025 pm 02:51 PM

The advantage of multithreading is that it can improve performance and resource utilization, especially for processing large amounts of data or performing time-consuming operations. It allows multiple tasks to be performed simultaneously, improving efficiency. However, too many threads can lead to performance degradation, so you need to carefully select the number of threads based on the number of CPU cores and task characteristics. In addition, multi-threaded programming involves challenges such as deadlock and race conditions, which need to be solved using synchronization mechanisms, and requires solid knowledge of concurrent programming, weighing the pros and cons and using them with caution.

How to avoid third-party interfaces returning 403 errors in Node environment? How to avoid third-party interfaces returning 403 errors in Node environment? Apr 01, 2025 pm 02:03 PM

How to avoid the third-party interface returning 403 error in the Node environment. When calling the third-party website interface using Node.js, you sometimes encounter the problem of returning 403 error. �...

See all articles