The WannaCry ransomware is wreaking havoc in the digital world. At last count, this malicious bit of code has affected over 200,000 computers worldwide.
A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility's operations because it is isolated from the Internet, the station's operator said on Tuesday.
Microsoft study analyses data from more than 600 million systems worldwide, offers solutions for mitigating both targeted and broad-based attacks.
The Conficker worm is especially tricky because it can evade corporate firewalls by passing from an infected machine onto a USB memory stick, then onto another PC.
The new variant, WORM_DOWNAD.E, runs using a random file name and random service name; it also propagates via MS08-067 to external IPs if the Internet is available.
Computer security experts, who have analysed the Conficker worm's code, say it is designed to begin a new phase on April 1, and it remains unclear whether it will unleash havoc or remain dormant.
The checks ensure that customers can identify any vulnerable systems as well as any system that is already compromised by the Conficker worm.
Microsoft has announced a $250,000 reward for information that results in the arrest and conviction of those responsible for illegally launching the Conficker malicious code on the Internet.