Service providers can automatically shut down a user connection, and specify that to get back online users have to follow certain steps, for example, by visiting the Microsoft site for the latest updates. ISPs can automatically shut down what they want, and can still connect users to Microsoft. |
The latest variants of Bozori even remove competing viruses like Zotob from the infected machines. |
The Million Dollar Homepage can be down for days and it's not as critical, but these attackers knew he had money and went after him. |
The most significant change has been the evolution of virus writing hobbyists into criminally operated gangs bent on financial gain. |
The most significant change has been the evolution of virus writing hobbyists into criminally operated gangs bent on financial gain. This trend is showing no signs of stopping. |
The phone is asking you 'yes' or 'no,' and clicking 'no' doesn't work. Until you answer 'yes' or 'no,' the phone won't work. People are getting frustrated, they don't know what else to do, so they click 'yes' and then they get infected. |
The potential [security threat] is huge. It's probably bigger than for any other vulnerability we've seen. Any version of Windows is vulnerable right now. |
The situation on the Internet right now is so bad that if you go and buy a brand new computer and turn it on and plug it into the Internet, it will be infected by a worm within five to ten minutes, |
The target is fooled into logging into a fake bank, where they ask for his authorization code. The fake bank logs into the real bank with the one-time password and moves money around. Then it gets back to the customer, says there has been a problem and asks him to give the next code. |
The vulnerability probably affects more computers than any other security vulnerability, ever. |
The worm can spread quite well once it finds its way beyond corporate firewalls. |
There appears to be three different virus writing gangs turning out new worms at an alarming rate -- as if they would be competing who would build the biggest network of infected machines. |
There is no need to have your computer online 24 hours (a day) as a target of an attack when you are sleeping or away from your computer. |
There might be no attack at all. As everybody knows about the attack, the virus writer may lay low and attack at a later date. The ISPs involved can actively block malicious postings. It's more likely the attacker will lay low or be blocked rather than succeed. |
There might be no attack at all. As everybody knows about the attack, the virus writer may lay low and attack at a later date. The ISPs involved can actively block malicious postings. It's more likely the attacker will lay low or be blocked, rather than succeed. |