There was no market because there were no Mac viruses. |
These will only get reported when people get home from work, and it will take awhile before they figure out who to call. |
This is enough to invoke the exploit and infect the machine. |
This is nasty, as this is done on all mounted drives, ie. any drive that has a drive letter. So it might affect your USB thumb drives, external hard drives and network drives. Also, if you're taking daily automatic backups, you might end up backing up the corrupted files over good files. |
This is the way virus writers can upgrade the infected machines. It's like [Microsoft's] Windows update for viruses. |
This time the attackers are targeting a private person because they know he has the money. |
This virus is nowhere near as widespread as some of the (recent virus) cases. The reason it's talked about is because it's more destructive. |
This was not a bug; this was something that was needed at the time. It is just bad design, design from another era. |
Unlike most other [worms], this one is really destructive. |
We are expecting to see problems in two weeks' time. |
We are seeing less of the big virus outbreaks such as Sasser and Blaster, and so some people believe the situation is getting better, when in fact it is getting worse. The bad boys are getting more professional and doing more targeted attacks. |
We estimate that in the future, every single phone will be running an antivirus system. |
We have listed URLs that we are recommending systems administrators block. We don't recommend blocking the whole domain, as 99 percent of the pages on these free Austrian and German domains are OK. You should just block the problem URLs. |
We have seen dozens of different attacks using this vulnerability since Dec. 27. One exploits image files and tries to get users to click on them; another is an MSN Messenger worm that will send the worm to people on your buddy list, and we have seen several spam attacks. |
We have two people who have contacted us and we have double-checked files from their systems. One (victim's machine) had write access to most to his company's network and the virus had deleted most of the company's data. |