It’s been just over a year since we experienced our last major network worm outbreak, Sasser, which exploited vulnerability in the LSASS component of Windows in April 2004. On the security response team at Microsoft, it is part of our process to do post mortems after incidents or outbreaks and review how we can better manage these incidents more effectively for customers. We did that after Slammer, which actually prompted the development of our Software Security Incident Response Plan; we did it exhaustively for months after Blaster; and again after Sasser.
|