Looking beyond the
Exploiting a vulnerability of
small computer programs called macros, the computer virus known as Melissa
was notable for the extraordinary speed with which it spread throughout
Pethia, R. 1999. The Melissa virus: Inoculating our information technology
from emerging threats. Available at http://www.house.gov/science/pethia_041599.htm.
Neumann, P.G. 1999. Computer-communications security risks: Melissa
is just the tip of a titanic iceberg. Available at http://www.csl.sri.com/neumann/house99.html.
Additional information about the U.S. House of Representatives Subcommittee
on Technology hearing on "The Melissa virus: Inoculating our information
technology from emerging threats" can be found at http://www.house.gov/science/106_hearing.htm#Technology
Carnegie Mellon University
CERT Coordination Center
Software Engineering Institute
Pittsburgh, PA 15213
Michael A. Vatis
Federal Bureau of Investigation
National Infrastructure and Protection Center
Washington, DC 20535
News, Vol. 155, No. 19, May 8, 1999, p. 303.
Copyright © 1999, Science Service.