Conficker returns, exploiting weak passwords on network systems
Infections by the persistent worm, which takes advantage of weak or shared passwords or stolen login tokens, rose in 2011, Microsoft says.
Infections by the persistent worm, which takes advantage of weak or shared passwords or stolen login tokens, rose in 2011, Microsoft says.